Stored Cross-Site Scripting in WP Reroute Email Plugin for WordPress
CVE-2023-3168
7.2HIGH
Summary
The WP Reroute Email plugin for WordPress is susceptible to Stored Cross-Site Scripting due to inadequate input sanitization and output escaping. Attackers can exploit this vulnerability in versions up to and including 1.4.9, allowing them to inject arbitrary scripts into email subjects. When a user accesses a compromised page, these scripts execute, potentially leading to unauthorized actions and data exposure.
Affected Version(s)
WP Reroute Email * <= 1.4.9
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Alex Thomas