Page 2 of 12 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0. • https://www.acymailing.com/change-log https://www.bugbounty.ch/advisories/CVE-2023-28733 • CWE-20: Improper Input Validation CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-116: Improper Encoding or Escaping of Output •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Missing access control in AnyMailing Joomla Plugin allows to list and access files containing sensitive information from the plugin itself and access to system files via path traversal, when being granted access to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin in versions below 8.3.0. • https://github.com/acyba/acymailing/releases/tag/v8.3.0 https://www.acymailing.com/change-log https://www.bugbounty.ch/advisories/CVE-2023-28732 • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0. • https://www.acymailing.com/change-log https://www.bugbounty.ch/advisories/CVE-2023-28731 • CWE-20: Improper Input Validation CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

When subscribing using AcyMailing, the 'redirect' parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim. Cuando se suscriben usando AcyMailing, el parámetro "redirect" no es saneado apropiadamente. Al cambiar la petición de POST a GET, un atacante puede diseñar un enlace que contenga una página de destino potencialmente maliciosa y enviársela a la víctima When subscribing using AcyMailing versions before 7.5.0, the 'redirect' parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim. • https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Acyba AcyMailing before 6.9.2 mishandles file uploads by admins. Acyba AcyMailing versiones anteriores a la versión 6.9.2, maneja inapropiadamente archivos cargados por administradores. • http://jvn.jp/en/jp/JVN56890693/index.html https://www.acyba.com/acymailing/68-acymailing-changelog.html?Itemid=329 • CWE-434: Unrestricted Upload of File with Dangerous Type •