GNU-Mailman Integration <= 1.0.6 Reflected Cross-Site Scripting
CVE-2021-38354

6.1MEDIUM

Key Information:

Vendor
Gnu-mailman Integration
Status
Gnu-mailman Integration
Vendor
CVE Published:
10 September 2021

Summary

The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6.

Affected Version(s)

GNU-Mailman Integration 1.0.6

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

p7e4
.