Cross-Site Request Forgery in WP HTML Mail Plugin by WordPress
CVE-2021-20779

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
7 July 2021

Summary

A cross-site request forgery (CSRF) vulnerability exists in the WP HTML Mail plugin for WordPress, allowing attackers to exploit it before version 3.0.8. This flaw can potentially enable attackers to take over sessions of administrators through deceptive means, leading to unauthorized actions without their consent. Proper precautions and updates are essential to mitigate the risks associated with this vulnerability.

Affected Version(s)

WordPress Email Template Designer - WP HTML Mail versions prior to 3.0.8

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.