CVE-2013-10028

A vulnerability was found in EELV Newsletter Plugin 2.x on WordPress. It has been rated as problematic. Affected by this issue is the function style_newsletter of the file lettreinfo.php. The manipulation of the argument email leads to cross site scripting. The attack may be launched remotely. The name of the patch is 3339b42316c5edf73e56eb209b6a3bb3e868d6ed. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230660.
References
Link Resource
https://github.com/wp-plugins/eelv-newsletter/commit/3339b42316c5edf73e56eb209b6a3bb3e868d6ed Patch
https://vuldb.com/?ctiid.230660 Permissions Required Third Party Advisory
https://vuldb.com/?id.230660 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:eelv_newsletter_project:eelv_newsletter:*:*:*:*:*:wordpress:*:*

History

09 Jun 2023, 18:49

Type Values Removed Values Added
CPE cpe:2.3:a:eelv_newsletter_project:eelv_newsletter:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References (MISC) https://github.com/wp-plugins/eelv-newsletter/commit/3339b42316c5edf73e56eb209b6a3bb3e868d6ed - (MISC) https://github.com/wp-plugins/eelv-newsletter/commit/3339b42316c5edf73e56eb209b6a3bb3e868d6ed - Patch
References (MISC) https://vuldb.com/?id.230660 - (MISC) https://vuldb.com/?id.230660 - Permissions Required, Third Party Advisory
References (MISC) https://vuldb.com/?ctiid.230660 - (MISC) https://vuldb.com/?ctiid.230660 - Permissions Required, Third Party Advisory

04 Jun 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-04 19:15

Updated : 2024-05-17 00:54


NVD link : CVE-2013-10028

Mitre link : CVE-2013-10028

CVE.ORG link : CVE-2013-10028


JSON object : View

Products Affected

eelv_newsletter_project

  • eelv_newsletter
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')