Логотип exploitDog
bind:CVE-2024-4290
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4290

Количество 2

Количество 2

nvd логотип

CVE-2024-4290

больше 1 года назад

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-xrf7-7j85-g93c

больше 1 года назад

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4290

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-xrf7-7j85-g93c

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу