First published: Fri Nov 10 2023(Updated: )
Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Newsletters plugin <= 4.8.8 versions.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tribulant Newsletters | <=4.8.8 |
Update to 4.8.9 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30478 refers to a Cross-Site Request Forgery (CSRF) vulnerability in the Tribulant Newsletters plugin version 4.8.8 and below for WordPress.
CVE-2023-30478 has a severity rating of 8.8 (high).
Cross-Site Request Forgery (CSRF) is a type of attack where an attacker tricks a victim into performing unwanted actions on a trusted website, without their knowledge or consent.
To fix the CVE-2023-30478 vulnerability, you should update your Tribulant Newsletters plugin to version 4.8.9 or higher.
You can find more information about CVE-2023-30478 at this link: [https://patchstack.com/database/vulnerability/newsletters-lite/wordpress-newsletters-plugin-4-8-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve](https://patchstack.com/database/vulnerability/newsletters-lite/wordpress-newsletters-plugin-4-8-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)