Show filters
126 Total Results
Displaying 61-70 of 126
Sort by:
Attacker Value
Unknown

CVE-2022-2351

Disclosure Date: September 16, 2022 (last updated October 08, 2023)
The Post SMTP Mailer/Email Log WordPress plugin before 2.1.4 does not escape some of its settings before outputting them in the admins dashboard, allowing high privilege users to perform Cross-Site Scripting attacks against other users even when the unfiltered_html capability is disallowed.
Attacker Value
Unknown

CVE-2022-2372

Disclosure Date: August 08, 2022 (last updated October 08, 2023)
The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
Attacker Value
Unknown

CVE-2022-2371

Disclosure Date: August 08, 2022 (last updated October 08, 2023)
The YaySMTP WordPress plugin before 2.2.1 does not have proper authorisation when saving its settings, allowing users with a role as low as subscriber to change them, and use that to conduct Stored Cross-Site Scripting attack due to the lack of escaping in them as well.
Attacker Value
Unknown

CVE-2022-2369

Disclosure Date: August 01, 2022 (last updated October 08, 2023)
The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the Logs of the plugin
Attacker Value
Unknown

CVE-2022-2370

Disclosure Date: August 01, 2022 (last updated November 08, 2023)
The YaySMTP WordPress plugin before 2.2.1 does not have capability check before displaying the Mailer Credentials in JS code for the settings, allowing any authenticated users, such as subscriber to retrieve them
Attacker Value
Unknown

CVE-2022-1612

Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Webriti SMTP Mail WordPress plugin through 1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Attacker Value
Unknown

CVE-2021-24874

Disclosure Date: February 14, 2022 (last updated February 23, 2025)
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.31 does not escape the lang and pid parameter before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
Attacker Value
Unknown

CVE-2021-24923

Disclosure Date: January 24, 2022 (last updated February 23, 2025)
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.25 does not escape the sib-statistics-date parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
Attacker Value
Unknown

CVE-2021-24528

Disclosure Date: August 30, 2021 (last updated February 23, 2025)
The FluentSMTP WordPress plugin before 2.0.1 does not sanitize parameters before storing the settings in the database, nor does the plugin escape the values before outputting them when viewing the SMTP settings set by this plugin, leading to a stored cross site scripting (XSS) vulnerability. Only users with roles capable of managing plugins can modify the plugin's settings.
Attacker Value
Unknown

CVE-2021-29400

Disclosure Date: August 10, 2021 (last updated February 23, 2025)
A cross-site request forgery (CSRF) vulnerability in the My SMTP Contact v1.1.1 plugin for GetSimple CMS allows remote attackers to change the SMTP settings of the contact forms for the webpages of the CMS after an authenticated admin visits a malicious third-party site.