Products
Sailthru Triggermail WordPress plugin
- through 1.1
Source
contact@wpscan.com
Tags
CVE-2024-4289 details
Published : May 21, 2024, 6:15 a.m.
Last Modified : May 21, 2024, 12:37 p.m.
Last Modified : May 21, 2024, 12:37 p.m.
Description
The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
References
URL | Source |
---|---|
https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/ | contact@wpscan.com |
This website uses the NVD API, but is not approved or certified by it.