First published: Fri Sep 16 2022(Updated: )
The Post SMTP Mailer/Email Log WordPress plugin before 2.1.4 does not escape some of its settings before outputting them in the admins dashboard, allowing high privilege users to perform Cross-Site Scripting attacks against other users even when the unfiltered_html capability is disallowed.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpexperts Post SMTP | <2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2351 is a vulnerability in the Post SMTP Mailer/Email Log WordPress plugin that allows high privilege users to perform Cross-Site Scripting attacks against other users.
The Post SMTP Mailer/Email Log WordPress plugin versions up to 2.1.4 are affected by CVE-2022-2351.
CVE-2022-2351 has a severity score of 4.8 (medium).
To fix the vulnerability, update the Post SMTP Mailer/Email Log WordPress plugin to version 2.1.4 or higher.
You can find more information about CVE-2022-2351 at the following reference link: [https://wpscan.com/vulnerability/f3fda033-58f5-446d-ade4-2336a39bfb87]