The plugin does not escape its 'E-Mail Error "From" Address' settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Put the following payload in the 'E-Mail Error "From" Address' settings of the plugin: "autofocus onfocus=alert(/XSS/) b=
fuzzyap1
fuzzyap1
Yes
2022-02-17 (about 1 years ago)
2022-02-17 (about 1 years ago)
2022-04-13 (about 11 months ago)