The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2656984/wp-html-mail/trunk/includes/class-template-designer.php | Patch Third Party Advisory |
https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-02-04 23:15
Updated : 2024-02-28 18:48
NVD link : CVE-2022-0218
Mitre link : CVE-2022-0218
CVE.ORG link : CVE-2022-0218
JSON object : View
Products Affected
codemiq
- wordpress_email_template_designer