An issue was discovered in the "Email Subscribers & Newsletters" plugin before 3.4.8 for WordPress. Sending an HTTP POST request to a URI with /?es=export at the end, and adding option=view_all_subscribers in the body, allows downloading of a CSV data file with all subscriber data.
References
Link | Resource |
---|---|
https://blog.threatpress.com/vulnerability-email-subscribers-plugin/ | Third Party Advisory |
https://wordpress.org/plugins/email-subscribers/#developers | Release Notes |
https://www.exploit-db.com/exploits/43872/ | Exploit Third Party Advisory VDB Entry |
https://blog.threatpress.com/vulnerability-email-subscribers-plugin/ | Third Party Advisory |
https://wordpress.org/plugins/email-subscribers/#developers | Release Notes |
https://www.exploit-db.com/exploits/43872/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.threatpress.com/vulnerability-email-subscribers-plugin/ - Third Party Advisory | |
References | () https://wordpress.org/plugins/email-subscribers/#developers - Release Notes | |
References | () https://www.exploit-db.com/exploits/43872/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-01-26 20:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-6015
Mitre link : CVE-2018-6015
CVE.ORG link : CVE-2018-6015
JSON object : View
Products Affected
icegram
- email_subscribers_\&_newsletters
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor