CVE-2023-3721
CVSS V2 None
CVSS V3 None
Description
The WP-EMail WordPress plugin before 2.69.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Overview
- CVE ID
- CVE-2023-3721
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-08-14T20:15:12
- Last Modified Date
- 2023-08-21T17:53:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:lesterchan:wp-email:*:*:*:*:*:wordpress:*:* | 1 | OR | 2.69.1 |
References
Reference URL | Reference Tags |
---|---|
https://wpscan.com/vulnerability/3f90347a-6586-4648-9f2c-d4f321bf801a | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-3721 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3721 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-09-06 03:43:37 | Added to TrackCVE | |||
2023-09-06 03:43:39 | Weakness Enumeration | new |