Unauthorized Data Modification in Newsletter2Go Plugin for WordPress
CVE-2024-12618
4.3MEDIUM
Summary
The Newsletter2Go plugin for WordPress is susceptible to unauthorized data modification due to a lack of capability validation on the 'resetStyles' AJAX action. This vulnerability affects all versions of the plugin up to and including version 4.0.14, enabling authenticated attackers with Subscriber-level access or higher to exploit this flaw and reset styles without proper authorization.
Affected Version(s)
Newsletter2Go * <= 4.0.14
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lucio Sá