PatchSiren cyber security CVE debrief
CVE-2026-7385 Decent Comments CVE debrief
CVE-2026-7385 describes an information disclosure issue in the Decent Comments WordPress plugin before 3.0.2. A REST API endpoint does not restrict access to comment author email addresses and post author email addresses, which allows unauthenticated attackers to enumerate registered user email addresses. The CVSS v3.1 vector provided by NVD is AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N, matching a medium-severity privacy exposure.
- Vendor
- Decent Comments
- Product
- Decent Comments WordPress plugin
- CVSS
- MEDIUM 5.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-20
Who should care
WordPress site owners, administrators, and security teams should care if the Decent Comments plugin is installed, especially on public-facing sites where user email privacy matters.
Technical summary
The supplied source corpus states that versions before 3.0.2 of the Decent Comments WordPress plugin expose comment author email addresses and post author email addresses via a REST API endpoint without access restrictions. Because the endpoint can be reached without authentication, an attacker can enumerate registered user email addresses. The NVD source item marks the CVE as Deferred and references the WPScan advisory.
Defensive priority
Medium priority: patch promptly if Decent Comments is installed, particularly on internet-facing WordPress sites.
Recommended defensive actions
- Upgrade Decent Comments to version 3.0.2 or later if installed.
- Inventory WordPress sites to confirm whether the Decent Comments plugin is present and in use.
- Review REST API exposure on affected sites and verify that no sensitive fields are unnecessarily returned.
- Treat exposed email addresses as sensitive data and monitor for abuse such as unsolicited enumeration or scraping.
- If immediate upgrading is not possible, consider temporarily disabling or restricting the plugin on public sites until remediation is complete.
Evidence notes
The CVE description supplied in the corpus states that Decent Comments WordPress plugin versions before 3.0.2 do not restrict access to comment author email addresses and post author email addresses via a REST API endpoint, allowing unauthenticated attackers to enumerate registered user email addresses. The NVD source item marks the record as Deferred and includes a WPScan advisory reference. No additional affected-product details beyond the supplied plugin name and version boundary were used.
Official resources
-
CVE-2026-7385 CVE record
CVE.org
-
CVE-2026-7385 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
Publicly disclosed in the CVE record on 2026-05-20. The supplied source item shows the NVD record as Deferred and references a WPScan advisory. Use the published CVE date for timing context.