VYPR
Medium severity5.8NVD Advisory· Published May 20, 2026· Updated May 20, 2026

CVE-2026-7385

CVE-2026-7385

Description

The Decent Comments WordPress plugin before 3.0.2 does not restrict access to comment author email addresses and post author email addresses via its REST API endpoint, allowing unauthenticated attackers to enumerate registered user email addresses.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Decent Comments WordPress plugin before 3.0.2 exposes comment and post author email addresses via an unauthenticated REST API endpoint.

Vulnerability

The Decent Comments WordPress plugin versions prior to 3.0.2 fail to restrict access to comment author email addresses and post author email addresses through its REST API endpoint. This allows any unauthenticated visitor to the site to query the API and retrieve email addresses associated with comments and posts. The affected versions are all releases before 3.0.2 [1].

Exploitation

An unauthenticated attacker needs only network access to the WordPress site's REST API. No authentication or special privileges are required. The attacker can send crafted API requests to the exposed endpoint that returns email addresses of comment authors and post authors. The public disclosure includes a proof of concept, confirming the ease of exploitation [1].

Impact

Successful exploitation enables an attacker to enumerate registered user email addresses on the WordPress site. This information disclosure could be leveraged for targeted phishing campaigns, social engineering, or further reconnaissance against the site's users. The attack does not require any user interaction or additional privileges [1].

Mitigation

The vulnerability is fixed in version 3.0.2 of the Decent Comments plugin. Site administrators should update to version 3.0.2 or later immediately. No workarounds have been provided by the vendor. The plugin has been disclosed publicly by the researcher Vaibhav Narkhede [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.