CVE-2026-7385
Description
The Decent Comments WordPress plugin before 3.0.2 does not restrict access to comment author email addresses and post author email addresses via its REST API endpoint, allowing unauthenticated attackers to enumerate registered user email addresses.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Decent Comments WordPress plugin before 3.0.2 exposes comment and post author email addresses via an unauthenticated REST API endpoint.
Vulnerability
The Decent Comments WordPress plugin versions prior to 3.0.2 fail to restrict access to comment author email addresses and post author email addresses through its REST API endpoint. This allows any unauthenticated visitor to the site to query the API and retrieve email addresses associated with comments and posts. The affected versions are all releases before 3.0.2 [1].
Exploitation
An unauthenticated attacker needs only network access to the WordPress site's REST API. No authentication or special privileges are required. The attacker can send crafted API requests to the exposed endpoint that returns email addresses of comment authors and post authors. The public disclosure includes a proof of concept, confirming the ease of exploitation [1].
Impact
Successful exploitation enables an attacker to enumerate registered user email addresses on the WordPress site. This information disclosure could be leveraged for targeted phishing campaigns, social engineering, or further reconnaissance against the site's users. The attack does not require any user interaction or additional privileges [1].
Mitigation
The vulnerability is fixed in version 3.0.2 of the Decent Comments plugin. Site administrators should update to version 3.0.2 or later immediately. No workarounds have been provided by the vendor. The plugin has been disclosed publicly by the researcher Vaibhav Narkhede [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<3.0.2+ 1 more
- (no CPE)range: <3.0.2
- (no CPE)range: <3.0.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.