Security for everyone

WordPress REST API User Enumeration Vulnerability Scanner

Detects 'User Enumeration' vulnerability in WordPress REST API.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

WordPress REST API User Enumeration Vulnerability Scanner Detail

WordPress Core is an open-source website creation tool written in PHP, primarily used for creating blogs, content management systems, and e-commerce websites. It is one of the most popular content management systems, boasting an extensive community and a wide range of plugins and themes to customize websites. WordPress Core is known for its ease of use, flexibility, and scalability, making it a go-to choice for businesses of all sizes.

The User Enumeration vulnerability detected in WordPress REST API allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. In simpler terms, anyone could view a list of post authors and sensitive user information, such as usernames and email addresses, via a REST API endpoint. This vulnerability was patched in the 4.7.1 update, but it still affects sites that have not been updated.

Exploiting this vulnerability could lead to serious consequences, such as unauthorized access to sensitive data, unauthorized user account creation, or a complete takeover of the website. Attackers could take advantage of this vulnerability by collecting information on users and using this information to launch further attacks. is a powerful platform that provides detailed reports on vulnerabilities in digital assets, including websites hosted on WordPress. Using the pro features of this platform, users can easily and quickly learn about vulnerabilities, take necessary precautions, and ensure the security of their websites. The platform offers a comprehensive set of features, including monthly reports, security alerts, and remediation advice, making it a valuable tool for businesses of all sizes. Protect your digital assets and stay ahead of potential threats with



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture