Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7cmx-pq9m-76p5

Опубликовано: 04 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 3.5

Описание

A vulnerability was found in EELV Newsletter Plugin 2.x on WordPress. It has been rated as problematic. Affected by this issue is the function style_newsletter of the file lettreinfo.php. The manipulation of the argument email leads to cross site scripting. The attack may be launched remotely. The name of the patch is 3339b42316c5edf73e56eb209b6a3bb3e868d6ed. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230660.

A vulnerability was found in EELV Newsletter Plugin 2.x on WordPress. It has been rated as problematic. Affected by this issue is the function style_newsletter of the file lettreinfo.php. The manipulation of the argument email leads to cross site scripting. The attack may be launched remotely. The name of the patch is 3339b42316c5edf73e56eb209b6a3bb3e868d6ed. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230660.

EPSS

Процентиль: 23%
0.00078
Низкий

3.5 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 3.5
nvd
больше 2 лет назад

A vulnerability was found in EELV Newsletter Plugin 2.x on WordPress. It has been rated as problematic. Affected by this issue is the function style_newsletter of the file lettreinfo.php. The manipulation of the argument email leads to cross site scripting. The attack may be launched remotely. The name of the patch is 3339b42316c5edf73e56eb209b6a3bb3e868d6ed. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230660.

CVSS3: 6.1
fstec
больше 2 лет назад

Уязвимость функции style_newsletter (lettreinfo.php) плагина EELV Newsletter системы управления содержимым сайта WordPress, позволяющая нарушителю проводить межсайтовые сценарные атаки

EPSS

Процентиль: 23%
0.00078
Низкий

3.5 Low

CVSS3

Дефекты

CWE-79