Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-5644 | 1 Wpvibes | 1 Wp Mail Log | 2024-09-25 | N/A | 7.6 HIGH |
The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users. | |||||
CVE-2023-5672 | 1 Wpvibes | 1 Wp Mail Log | 2024-02-05 | N/A | 6.5 MEDIUM |
The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file path parameters when attaching files to emails, leading to local file inclusion, and allowing an attacker to leak the contents of arbitrary files. | |||||
CVE-2023-51410 | 1 Wpvibes | 1 Wp Mail Log | 2024-02-05 | N/A | 8.8 HIGH |
Unrestricted Upload of File with Dangerous Type vulnerability in WPVibes WP Mail Log.This issue affects WP Mail Log: from n/a through 1.1.2. | |||||
CVE-2023-5673 | 1 Wpvibes | 1 Wp Mail Log | 2024-02-05 | N/A | 8.8 HIGH |
The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file extensions uploading files to attach to emails, allowing attackers to upload PHP files, leading to remote code execution. | |||||
CVE-2023-5645 | 1 Wpvibes | 1 Wp Mail Log | 2024-02-05 | N/A | 8.8 HIGH |
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor. | |||||
CVE-2023-5674 | 1 Wpvibes | 1 Wp Mail Log | 2024-02-05 | N/A | 8.8 HIGH |
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor. | |||||
CVE-2023-3088 | 1 Wpvibes | 1 Wp Mail Log | 2024-02-04 | N/A | 6.1 MEDIUM |
The WP Mail Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |