Description
The Guest Support plugin for WordPress is vulnerable to User Email Disclosure in versions up to, and including, 1.2.3. This is due to the plugin exposing a public AJAX endpoint that allows anyone to search for and retrieve user email addresses without any authentication or capability checks. This makes it possible for unauthenticated attackers to enumerate user accounts and extract email addresses via the guest_support_handler=ajax endpoint with the request=get_users parameter.
Published: 2025-12-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Update Plugin
AI Analysis

Impact

The Guest Support plugin for WordPress includes an unauthenticated AJAX endpoint that allows anyone to search for and retrieve user email addresses. This vulnerability, identified as CWE-200, enables attackers to enumerate user accounts and extract email addresses using the guest_support_handler=ajax endpoint with the request=get_users parameter. The result is a disclosure of potentially sensitive personal information and exposure of user identity data.

Affected Systems

Versions of the Guest Support plugin from rcatheme up to and including 1.2.3 are affected. Any WordPress site running these plugin versions without applied patches is vulnerable to the described email disclosure.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Attackers are believed to exploit this weakness by sending unauthenticated HTTP requests to the guest_support_handler endpoint, with the request=get_users parameter, to harvest email addresses. No authentication or capability checks are performed, making the exploit straightforward for anyone with network access to the site.

Generated by OpenCVE AI on April 22, 2026 at 16:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Guest Support to the latest version that resolves the issue.
  • If an update is not feasible, disable the guest_support_handler AJAX endpoint or deactivate the plugin entirely.
  • Add firewall or rule to block unauthenticated requests to guest_support_handler=ajax?request=get_users to prevent exploitation.

Generated by OpenCVE AI on April 22, 2026 at 16:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 18 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Guest Support plugin for WordPress is vulnerable to User Email Disclosure in versions up to, and including, 1.2.3. This is due to the plugin exposing a public AJAX endpoint that allows anyone to search for and retrieve user email addresses without any authentication or capability checks. This makes it possible for unauthenticated attackers to enumerate user accounts and extract email addresses via the guest_support_handler=ajax endpoint with the request=get_users parameter.
Title Guest Support <= 1.2.3 - Unauthenticated User Email Disclosure in guest_support_handler AJAX Endpoint
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:32:26.697Z

Reserved: 2025-11-25T16:08:54.521Z

Link: CVE-2025-13660

cve-icon Vulnrichment

Updated: 2025-12-18T17:10:27.631Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T07:15:44.373

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13660

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:15:21Z

Weaknesses