Page 3 of 29 results (0.042 seconds)

CVSS: 5.3EPSS: %CPEs: 1EXPL: 0

The BlossomThemes Email Newsletter plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the bten_get_mailing_list function in versions up to, and including, 2.2.4. This makes it possible for unauthenticated attackers to obtain a mailing list. • CWE-862: Missing Authorization •

CVSS: 6.5EPSS: %CPEs: 1EXPL: 0

The Easy Newsletter Signups plugin for WordPress is vulnerable to unauthorized modification and disclosure of data due to a missing capability check on the wpesn_ltable_process_bulk_action() function hooked via admin_init in versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to delete and export subscriber lists. • CWE-862: Missing Authorization •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks The Newsletter Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘nl_data’ parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/fed1e184-ff56-44fe-9876-d17c0156447a • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce. The Newsletter Popup plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wp_newsletter_show_localrecord page. This makes it possible for unauthenticated attackers to delete records via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Attackers can unsubscribe everyone via a series of modified subscription UIDs in deleteAction operations. Se descubrió un problema en la extensión fp_newsletter (también conocida como administración de suscriptores de boletines) antes de 1.1.1, 1.2.0, 2.x antes de 2.1.2, 2.2.1 hasta 2.4.0 y 3.x antes de 3.2.6 para TYPO3. Los atacantes pueden cancelar la suscripción de todos a través de una serie de UID de suscripción modificados en operaciones de eliminación de acciones. • https://typo3.org/security/advisory/typo3-ext-sa-2022-017 •