Vulnerability Details : CVE-2019-9880
Potential exploit
An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username.
Products affected by CVE-2019-9880
- cpe:2.3:a:wpengine:wpgraphql:0.2.3:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-9880
43.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-9880
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST | |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2019-9880
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-9880
-
https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0
Release v0.3.0 · wp-graphql/wp-graphql · GitHubRelease Notes;Third Party Advisory
-
https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py
snippets/wp-graphql0.2.3_exploit.py at master · pentestpartners/snippets · GitHubExploit;Third Party Advisory
-
http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html
WordPress WPGraphQL 0.2.3 Authentication Bypass / Information Disclosure ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/
Pwning WordPress GraphQL | Pen Test PartnersExploit;Third Party Advisory
-
https://wpvulndb.com/vulnerabilities/9282
WPGraphQL <= 0.2.3 - Multiple VulnerabilitiesVendor Advisory
Jump to