A vulnerability was found in EELV Newsletter Plugin 2.x on WordPress. It has been rated as problematic. Affected by this issue is the function style_newsletter of the file lettreinfo.php. The manipulation of the argument email leads to cross site scripting. The attack may be launched remotely. The name of the patch is 3339b42316c5edf73e56eb209b6a3bb3e868d6ed. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230660.
References
Link | Resource |
---|---|
https://github.com/wp-plugins/eelv-newsletter/commit/3339b42316c5edf73e56eb209b6a3bb3e868d6ed | Patch |
https://vuldb.com/?ctiid.230660 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.230660 | Permissions Required Third Party Advisory |
Configurations
History
09 Jun 2023, 18:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:eelv_newsletter_project:eelv_newsletter:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | (MISC) https://github.com/wp-plugins/eelv-newsletter/commit/3339b42316c5edf73e56eb209b6a3bb3e868d6ed - Patch | |
References | (MISC) https://vuldb.com/?id.230660 - Permissions Required, Third Party Advisory | |
References | (MISC) https://vuldb.com/?ctiid.230660 - Permissions Required, Third Party Advisory |
04 Jun 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-04 19:15
Updated : 2024-05-17 00:54
NVD link : CVE-2013-10028
Mitre link : CVE-2013-10028
CVE.ORG link : CVE-2013-10028
JSON object : View
Products Affected
eelv_newsletter_project
- eelv_newsletter
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')