Strategic OSINT: Finding Out Who Has Access to the Bellingham Public Schools Website

By Jamisen Renoud

May 11th, 2025 (Updated Aug 15th, 2025 because im a goof - See bottom of this page for info)

Note: This is a completely public endpoint. No login or security was bypassed.

While exploring the Bellingham Public Schools website, I discovered it runs on WordPress, which exposes some surprisingly useful API endpoints. By querying /wp-json/wp/v2/users, I could pull a list of registered authors with access to publish content on the site - no login or credentials required.

The Endpoint

This URL revealed the full author list:
https://bellinghamschools.org/wp-json/wp/v2/users, adding ?per_page=100 made my life easier also.

Image showing json output

Users Discovered

All job titles sourced from the official Bellingham Public Schools website contact page. Any persons not listed there includes a source if available.

District Site (Updated Aug 15th, 2025)

Users Discovered

Sehome Site

Now I went to look at sehome.bellinghamschools.org, and found these users.

Why It Matters

Even though no private data was exposed, this tells us who has access, and could be targeted by phishing campaigns.

Updates to This Post

While looking at the District site again, I discovered I missed many users as I didn't think there was more pages to the json. As of Aug 15th, 2025 relative updates have been made to this post such as adding missing users, adding more job titles, correcting incorrect info that these were users with admin access, and re-bumping this post to the top of my homepage.

This post is licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license.