First published: Mon May 17 2021(Updated: )
When subscribing using AcyMailing, the 'redirect' parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phlymail | <7.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2021-24288.
The title of this vulnerability is 'When subscribing using AcyMailing the redirect parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim.'
This vulnerability affects AcyMailing when subscribing.
The severity of CVE-2021-24288 is medium with a CVSS score of 6.1.
To fix this vulnerability, users should update AcyMailing to version 7.5.1 or later and ensure that input validation and sanitization are properly implemented.