WordPress Plugin Vulnerabilities
Newsletter 3.7.0 - Open Redirect
Description
The Newsletter plugin is susceptible to an Open Redirect vulnerability. This issue is due to the fact user input it taken, and trusted, without validation.
This user input is used when tracking link clicks, via the ‘newsletter/statistics/link.php’ script. User input is Base64 encoded, and split on the ‘;’ character, the third column of which can be manipulated in order to control where the user is redirected to.
Affects Plugins
References
Classification
Type
REDIRECT
OWASP top 10
CWE
CVSS
Miscellaneous
Submitter
James Hooker
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2015-03-30 (about 11 years ago)
Added
2015-03-30 (about 11 years ago)
Last Updated
2020-08-12 (about 5 years ago)