Atomic Edge analysis of CVE-2026-3504: An unauthenticated information disclosure vulnerability in the Dokan WooCommerce Multivendor Marketplace Solution plugin for WordPress, up to version 4.3.1. The flaw exists in the store reviews REST API endpoint, allowing attackers to extract sensitive user data without authentication when the Pro version is installed with store reviews enabled. The CVSS score is 5.3 (Medium).
The root cause is in the `prepare_reviews_for_response` method within `/dokan-lite/includes/REST/StoreController.php`. The vulnerable code (lines 831-835 and 851-854) exposes the `user_login` (username) and `user_email` fields for registered users, and the `comment_author_email` field for guest reviews, within the API response’s ‘author’ object. Atomic Edge analysis confirms that this occurs without any authorization check on the `/dokan/v1/stores/{id}/reviews` endpoint for unauthenticated users.
An attacker can exploit this by sending a GET request to the REST API endpoint `/dokan/v1/stores/{id}/reviews` for any store ID. The endpoint returns a JSON response containing review data. Within each review’s ‘author’ object, the vulnerable response includes ‘id’ (user ID), ‘name’ (username for registered users), and ’email’ (user email for registered users or comment author email for guests). No authentication token or nonce is required.
The patch modifies `StoreController.php` lines 831-838 and 850-854. The fix changes the ‘name’ field for registered users from `$user->user_login` (the username) to `$user->display_name` (the display name, which is often not sensitive). It removes the `’email’ => $user->user_email` line entirely for registered users. For guest reviews, it removes the `’email’ => $item->comment_author_email` line. This sanitized response now only exposes the user ID and display name, preventing email and username leakage.
Successful exploitation allows an unauthenticated attacker to enumerate email addresses and usernames of all customers who have left reviews on any vendor’s store. This information can be leveraged for targeted phishing campaigns, credential stuffing attacks, or further reconnaissance to identify high-value users. The exposure of user IDs also aids in user enumeration attacks against the WordPress installation.







