The Liaison Site Prober plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 1.2.1 via the /wp-json/site-prober/v1/logs REST API endpoint. The permissions_read() permission callback unconditionally returns true (via __return_true()) instead of checking for appropriate capabilities. This makes it possible for unauthenticated attackers to retrieve sensitive audit log data including IP addresses, user IDs, usernames, login/logout events, failed login attempts, and detailed activity descriptions.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 08:00:00 +0000
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-24T12:02:32.146Z
Reserved: 2026-03-04T20:51:43.677Z
Link: CVE-2026-3569
Updated: 2026-04-24T12:02:27.229Z
Status : Deferred
Published: 2026-04-24T08:16:30.217
Modified: 2026-04-24T14:38:26.740
Link: CVE-2026-3569
No data.
OpenCVE Enrichment
No data.