First published: Mon Apr 08 2024(Updated: )
The SendPress Newsletters WordPress plugin through 1.23.11.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
SendPress Newsletters | <=1.23.11.6 | |
Pressified SendPress | <=1.23.11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1588 is classified as a high severity vulnerability due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-1588, update the SendPress Newsletters plugin to version 1.23.11.7 or later, where the vulnerability is addressed.
CVE-2024-1588 affects users of the SendPress Newsletters plugin version 1.23.11.6 and earlier.
CVE-2024-1588 is a Stored Cross-Site Scripting (XSS) vulnerability that allows the injection of malicious scripts.
No, only high privilege users, such as administrators, can exploit CVE-2024-1588 to perform attacks.