The Newsletters WordPress plugin before 4.9.3 does not properly escape user-controlled parameters when they are appended to SQL queries and shell commands, which could enable an administrator to run arbitrary commands on the server.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ - Exploit, Third Party Advisory |
23 Jan 2024, 14:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ - Exploit, Third Party Advisory | |
First Time |
Tribulant
Tribulant newsletters |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CPE | cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-77 |
16 Jan 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-16 16:15
Updated : 2024-11-21 08:35
NVD link : CVE-2023-4797
Mitre link : CVE-2023-4797
CVE.ORG link : CVE-2023-4797
JSON object : View
Products Affected
tribulant
- newsletters
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')