The SMTP Mailing Queue WordPress plugin before 2.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
References
Link | Resource |
---|---|
https://github.com/youki992/youki992.github.io/blob/master/others/apply.md | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/d470dd6c-dcac-4a3e-b42a-2489a31aca45 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 04:02
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-05-02 08:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-1090
Mitre link : CVE-2023-1090
CVE.ORG link : CVE-2023-1090
JSON object : View
Products Affected
smtp_mailing_queue_project
- smtp_mailing_queue
CWE
No CWE.