WordPress Plugin Vulnerabilities

Newsletter 3.7.0 - Open Redirect

Description

The Newsletter plugin is susceptible to an Open Redirect vulnerability. This issue is due to the fact user input it taken, and trusted, without validation.

This user input is used when tracking link clicks, via the ‘newsletter/statistics/link.php’ script. User input is Base64 encoded, and split on the ‘;’ character, the third column of which can be manipulated in order to control where the user is redirected to.

Affects Plugins

Fixed in 3.8.3

References

Classification

Type
REDIRECT
OWASP top 10
CWE
CVSS

Miscellaneous

Submitter
James Hooker
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2015-03-30 (about 11 years ago)
Added
2015-03-30 (about 11 years ago)
Last Updated
2020-08-12 (about 5 years ago)

Other