Vulnerabilities (CVE)

Filtered by vendor Wpvibes Subscribe
Filtered by product Wp Mail Log
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-5674 1 Wpvibes 1 Wp Mail Log 2024-11-21 N/A 8.8 HIGH
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor.
CVE-2023-5673 1 Wpvibes 1 Wp Mail Log 2024-11-21 N/A 8.8 HIGH
The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file extensions uploading files to attach to emails, allowing attackers to upload PHP files, leading to remote code execution.
CVE-2023-5672 1 Wpvibes 1 Wp Mail Log 2024-11-21 N/A 6.5 MEDIUM
The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file path parameters when attaching files to emails, leading to local file inclusion, and allowing an attacker to leak the contents of arbitrary files.
CVE-2023-5645 1 Wpvibes 1 Wp Mail Log 2024-11-21 N/A 8.8 HIGH
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor.
CVE-2023-5644 1 Wpvibes 1 Wp Mail Log 2024-11-21 N/A 7.6 HIGH
The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users.
CVE-2023-51410 1 Wpvibes 1 Wp Mail Log 2024-11-21 N/A 9.9 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in WPVibes WP Mail Log.This issue affects WP Mail Log: from n/a through 1.1.2.
CVE-2023-3088 1 Wpvibes 1 Wp Mail Log 2024-11-21 N/A 7.2 HIGH
The WP Mail Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.