Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gc42-wwv9-7qjr

Опубликовано: 07 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.

The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.

EPSS

Процентиль: 28%
0.00099
Низкий

7.2 High

CVSS3

Дефекты

CWE-862

Связанные уязвимости

CVSS3: 7.2
nvd
больше 2 лет назад

The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.

EPSS

Процентиль: 28%
0.00099
Низкий

7.2 High

CVSS3

Дефекты

CWE-862