5 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://plugins.trac.wordpress.org/changeset/2922163 https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6ec3a-c5fd-4f63-a9a0-2c9ddfb96e2e?source=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The YaySMTP WordPress plugin before 2.2.1 does not have proper authorisation when saving its settings, allowing users with a role as low as subscriber to change them, and use that to conduct Stored Cross-Site Scripting attack due to the lack of escaping in them as well. El plugin YaySMTP de WordPress versiones anteriores a 2.2.1, no presenta una autorización apropiada cuando guarda sus configuraciones, lo que permite a usuarios con un rol tan bajo como el de suscriptor cambiarlas, y usarlo para conducir ataques de tipo Cross-Site Scripting Almacenado debido a una falta de escapes en ellas también The YaySMTP – Simple WP SMTP Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'settings[fromName]' parameter in versions up to, and including, 2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) El plugin YaySMTP de WordPress versiones anteriores a 2.2.2 no sanea ni escapa de algunos de sus parámetros, lo que podría permitir a usuarios con altos privilegios, como el administrador, llevar a cabo ataques de tipo Cross-Site Scripting Almacenado cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio) The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters, with at least one being the 'client_id' parameter, in versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, administrator and above, to inject arbitrary web scripts stored in the plugin options. • https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the Logs of the plugin El plugin YaySMTP de WordPress versiones anteriores a 2.2.1, no presenta comprobación de capacidad en una acción AJAX, lo que permite a cualquier usuario autenticado, como el suscriptor, visualizar los registros del plugin The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the logs of the plugin • https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The YaySMTP WordPress plugin before 2.2.1 does not have capability check before displaying the Mailer Credentials in JS code for the settings, allowing any authenticated users, such as subscriber to retrieve them El plugin YaySMTP de WordPress versiones anteriores a 2.2.1, no dispone de una comprobación de capacidad antes de mostrar las credenciales de correo en el código JS para la configuración, permitiendo a cualquier usuario autenticado, como el suscriptor, recuperarlas • https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334 • CWE-862: Missing Authorization •