Логотип exploitDog
bind:CVE-2024-4290
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4290

Количество 2

Количество 2

nvd логотип

CVE-2024-4290

почти 2 года назад

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-xrf7-7j85-g93c

почти 2 года назад

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4290

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
0%
Низкий
почти 2 года назад
github логотип
GHSA-xrf7-7j85-g93c

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS3: 7.1
0%
Низкий
почти 2 года назад

Уязвимостей на страницу