wordpress core < 5.2.3 viewing unauthenticatedpasswordprivate posts
▸▸▸ Exploit & Vulnerability >> webapps exploit & multiple vulnerability
So far we know that adding `?static=1` to a wordpress URL should leak its secret content Here are a few ways to manipulate the returned entries: - `order` with `asc` or `desc` - `orderby` - `m` with `m=YYYY`, `m=YYYYMM` or `m=YYYYMMDD` date format In this case, simply reversing the order of the returned elements suffices and `http://wordpress.local/?static=1&order=asc` will show the secret content:
Wordpress core < 5.2.3 viewing unauthenticatedpasswordprivate posts Vulnerability / Exploit Source : Wordpress core < 5.2.3 viewing unauthenticatedpasswordprivate posts