{"id":"CVE-2009-2335","details":"WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\"","modified":"2025-08-09T19:01:27Z","published":"2009-07-10T21:00:00Z","references":[{"type":"EVIDENCE","url":"http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked"},{"type":"ADVISORY","url":"http://securitytracker.com/id?1022528"},{"type":"ADVISORY","url":"http://www.exploit-db.com/exploits/9110"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/504795/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/35581"},{"type":"FIX","url":"http://www.vupen.com/english/advisories/2009/1833"},{"type":"ADVISORY","url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"},{"type":"ADVISORY","url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"},{"type":"ADVISORY","url":"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"},{"type":"ADVISORY","url":"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"},{"type":"WEB","url":"http://www.osvdb.org/55713"}],"schema_version":"1.7.3"}