SQL Injection Vulnerability in Mail Masta Plugin for WordPress
CVE-2017-6098
7.2HIGH
Summary
A security flaw in the Mail Masta plugin for WordPress, specifically in version 1.0, allows for SQL injection through the 'list_id' POST parameter in the 'campaign_save.php' file. This vulnerability requires authentication to the WordPress admin panel, but it can be exploited to manipulate the database and potentially access sensitive information.
References
EPSS Score
7% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved