14 results (0.001 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks The Newsletter Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘nl_data’ parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/fed1e184-ff56-44fe-9876-d17c0156447a • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce. The Newsletter Popup plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wp_newsletter_show_localrecord page. This makes it possible for unauthenticated attackers to delete records via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Attackers can unsubscribe everyone via a series of modified subscription UIDs in deleteAction operations. Se descubrió un problema en la extensión fp_newsletter (también conocida como administración de suscriptores de boletines) antes de 1.1.1, 1.2.0, 2.x antes de 2.1.2, 2.2.1 hasta 2.4.0 y 3.x antes de 3.2.6 para TYPO3. Los atacantes pueden cancelar la suscripción de todos a través de una serie de UID de suscripción modificados en operaciones de eliminación de acciones. • https://typo3.org/security/advisory/typo3-ext-sa-2022-017 •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Data about subscribers may be obtained via createAction operations. Se descubrió un problema en la extensión fp_newsletter (también conocida como administración de suscriptores de boletines) antes de 1.1.1, 1.2.0, 2.x antes de 2.1.2, 2.2.1 hasta 2.4.0 y 3.x antes de 3.2.6 para TYPO3. Los datos sobre los suscriptores se pueden obtener mediante operaciones createAction. • https://typo3.org/security/advisory/typo3-ext-sa-2022-017 •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. There is a CAPTCHA bypass that can lead to subscribing many people. Se descubrió un problema en la extensión fp_newsletter (también conocida como administración de suscriptores de boletines) antes de 1.1.1, 1.2.0, 2.x antes de 2.1.2, 2.2.1 hasta 2.4.0 y 3.x antes de 3.2.6 para TYPO3. Existe una omisión de CAPTCHA que puede llevar a que muchas personas se suscriban. • https://typo3.org/security/advisory/typo3-ext-sa-2022-017 •