First published: Wed Jul 12 2023(Updated: )
The WP Mail Logging plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: An incomplete fix was released in 1.11.1.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPMailLogging by Awesomemotive | <1.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3081 is considered a high-severity vulnerability due to the potential for unauthenticated attackers to execute arbitrary scripts.
To fix CVE-2023-3081, update the WP Mail Logging plugin to version 1.11.2 or later to ensure proper input sanitization and output escaping.
CVE-2023-3081 affects all WP Mail Logging plugin versions up to and including 1.11.1.
CVE-2023-3081 allows for Stored Cross-Site Scripting attacks, enabling attackers to inject scripts into email contents.
Yes, CVE-2023-3081 specifically affects the WP Mail Logging plugin used within WordPress installations.