First published: Thu Aug 15 2019(Updated: )
wp-admin/admin-ajax.php?action=newsletters_exportmultiple in the Tribulant Newsletters plugin before 4.6.19 for WordPress allows directory traversal with resultant remote PHP code execution via the subscribers[1][1] parameter in conjunction with an exportfile=../ value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tribulant Newsletters | <4.6.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-14788.
The title of this vulnerability is 'wp-admin/admin-ajax.php?action=newsletters_exportmultiple in the Tribulant Newsletters plugin before…'.
The severity of CVE-2019-14788 is high.
CVE-2019-14788 allows remote PHP code execution through directory traversal and manipulation of the 'subscribers[1][1]' and 'exportfile' parameters.
To fix CVE-2019-14788, you should update the Tribulant Newsletters plugin to version 4.6.19 or later.