Attack Vectors
This medium-severity issue (CVSS 4.3) affects WordPress core versions up to and including 6.9.1. It can be exploited by an authenticated user with at least Author-level access (i.e., someone who can log in and create/edit content).
An attacker can use WordPress’s built-in AJAX media query functionality—specifically the query-attachments endpoint—to retrieve media attachment data and infer information about the posts those attachments belong to. No victim interaction is required once the attacker has access.
Security Weakness
The root cause is a missing authorization (capability) check in the wp_prepare_attachment_for_js() function for the uploadedToTitle and uploadedToLink fields. When WordPress prepares attachment details for the Media Library and returns them via the query-attachments AJAX response, it includes the parent post’s title without verifying the current user has read_post permission for that parent post.
As a result, authenticated users who should not be able to see details of private, draft, or otherwise restricted posts may still be able to discover those post titles through attachment queries.
Remediation: update WordPress to 6.8.4 or 6.9.2 (or any newer patched release) to address the missing capability check.
Technical or Business Impacts
While this vulnerability does not expose full post content, the disclosure of restricted post titles can still create meaningful business risk. Titles often contain sensitive context—such as upcoming campaign names, product launches, M&A initiatives, incident-response notes, or client-specific work—that can be valuable to a competitor or harmful if leaked.
For marketing and executive stakeholders, the practical impact is increased information leakage from inside the CMS. Even limited disclosure can undermine embargoed announcements, compromise confidential planning, and create compliance concerns if titles include regulated or customer-identifiable details. Because exploitation requires only low privileges (an authenticated Author+ account), the risk is higher in environments with many contributors, agencies, contractors, or shared logins.
Similar Attacks
Authorization failures (including missing capability checks and IDOR-style access control gaps) are a common source of real-world data exposure and unauthorized actions. Examples include:
CVE-2017-5487 (WordPress REST API content injection due to authorization handling)
CVE-2023-0669 (GoAnywhere MFT authentication bypass exploited for unauthorized access)
CVE-2019-11510 (Pulse Secure VPN arbitrary file read used to expose sensitive information)
Recent Comments