A Reflected Authenticated Cross-Site Scripting (XSS) vulnerability in the Newsletter plugin before 6.8.2 for WordPress allows remote attackers to trick a victim into submitting a tnpc_render AJAX request containing either JavaScript in an options parameter, or a base64-encoded JSON string containing JavaScript in the encoded_options parameter.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.wordfence.com/blog/2020/08/newsletter-plugin-vulnerabilities-affect-over-300000-sites/ | Exploit Third Party Advisory | 
| https://www.wordfence.com/blog/2020/08/newsletter-plugin-vulnerabilities-affect-over-300000-sites/ | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:28
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.wordfence.com/blog/2020/08/newsletter-plugin-vulnerabilities-affect-over-300000-sites/ - Exploit, Third Party Advisory | 
18 May 2023, 15:42
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:* | 
Information
                Published : 2021-01-01 02:15
Updated : 2024-11-21 05:28
NVD link : CVE-2020-35933
Mitre link : CVE-2020-35933
CVE.ORG link : CVE-2020-35933
JSON object : View
Products Affected
                thenewsletterplugin
- newsletter
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
