GNU-Mailman Integration <= 1.0.6 Reflected Cross-Site Scripting
CVE-2021-38354
6.1MEDIUM
Key Information:
- Vendor
- Gnu-mailman Integration
- Status
- Gnu-mailman Integration
- Vendor
- CVE Published:
- 10 September 2021
Summary
The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6.
Affected Version(s)
GNU-Mailman Integration 1.0.6
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
p7e4