In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/106220 | vdb entry third party advisory |
https://wordpress.org/support/wordpress-version/version-5-0-1/ | release notes vendor advisory |
https://wpvulndb.com/vulnerabilities/9174 | vendor advisory |
https://codex.wordpress.org/Version_4.9.9 | product vendor advisory |
https://www.debian.org/security/2019/dsa-4401 | third party advisory vendor advisory |
https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | release notes vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html | third party advisory mailing list |
https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/ | press/media coverage third party advisory |