CVE-2024-12323
CVSS V2 None
CVSS V3 None
Description
The turboSMTP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link while logged in to turboSMTP.
Overview
- CVE ID
- CVE-2024-12323
- Assigner
- Wordfence
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-12-10T14:28:14.657Z
- Last Modified Date
- 2024-12-10T15:37:56.909Z
Weakness Enumerations
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-12323 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12323 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-12-11 13:28:15 | Added to TrackCVE |