Reflected Cross-Site Scripting Vulnerability in WordPress Email Newsletter Plugin
CVE-2024-13098
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 1 February 2025
Badges
Summary
The WordPress Email Newsletter plugin, up to version 1.1, contains a vulnerability that does not properly sanitize and escape user inputs before rendering on pages. This oversight allows attackers to execute reflected cross-site scripting attacks, which could potentially target users with high privileges, including administrators. By exploiting this weakness, an attacker could inject malicious scripts into the web page viewed by affected users, leading to unauthorized actions and data exposure.
Affected Version(s)
WordPress Email Newsletter 0 <= 1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved