How the WordPress REST API Vulnerability Works