Description
The Liaison Site Prober plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 1.2.1 via the /wp-json/site-prober/v1/logs REST API endpoint. The permissions_read() permission callback unconditionally returns true (via __return_true()) instead of checking for appropriate capabilities. This makes it possible for unauthenticated attackers to retrieve sensitive audit log data including IP addresses, user IDs, usernames, login/logout events, failed login attempts, and detailed activity descriptions.
Problem types
Product status
Any version
Timeline
| 2026-04-23: | Disclosed |
Credits
Itthidej Aramsri
References
www.wordfence.com/...-40e2-4187-b803-34500b36be0a?source=cve
plugins.trac.wordpress.org/...ss-liaison-rest-controller.php
plugins.trac.wordpress.org/...ss-liaison-rest-controller.php
plugins.trac.wordpress.org/...ss-liaison-rest-controller.php
plugins.trac.wordpress.org/...ss-liaison-rest-controller.php
plugins.trac.wordpress.org/...ss-liaison-rest-controller.php
plugins.trac.wordpress.org/...ss-liaison-rest-controller.php
plugins.trac.wordpress.org/...e-prober&sfp_email=&sfph_mail=