WordPress Plugin Vulnerabilities
Email Artillery <= 4.1 - CSRF to Stored XSS
Description
The plugin does not sanitise, validate or escape its settings, and is lacking any CSRF check before saving them. As a result, an attacker could make a logged in admin change them and put malicious JavaScript code as well, leading to Stored Cross-Site Scripting issues.
Proof of Concept
Affects Plugins
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
WPScanTeam
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-08-16 (about 4 years ago)
Added
2021-08-16 (about 4 years ago)
Last Updated
2021-08-16 (about 4 years ago)