CVE-2022-0218

The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.
Configurations

Configuration 1 (hide)

cpe:2.3:a:codemiq:wordpress_email_template_designer:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:38

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/2656984/wp-html-mail/trunk/includes/class-template-designer.php - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2656984/wp-html-mail/trunk/includes/class-template-designer.php - Patch, Third Party Advisory
References () https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/ - Exploit, Third Party Advisory () https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/ - Exploit, Third Party Advisory
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 8.3

Information

Published : 2022-02-04 23:15

Updated : 2024-11-21 06:38


NVD link : CVE-2022-0218

Mitre link : CVE-2022-0218

CVE.ORG link : CVE-2022-0218


JSON object : View

Products Affected

codemiq

  • wordpress_email_template_designer
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-862

Missing Authorization