First published: Sun Apr 07 2024(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MailMunch MailMunch – Grow your Email List allows Stored XSS.This issue affects MailMunch – Grow your Email List: from n/a through 3.1.6.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
MailMunch | <3.1.7 | |
MailMunch | <=3.1.6 | |
WordPress MailMunch | <=3.1.6 |
Update to 3.1.7 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31349 is classified as a high severity vulnerability due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2024-31349, update MailMunch – Grow your Email List to version 3.1.7 or later.
CVE-2024-31349 allows attackers to inject malicious scripts that can steal user data, redirect users, or perform other unauthorized actions.
CVE-2024-31349 affects all versions of MailMunch – Grow your Email List up to and including 3.1.6.
Anyone using MailMunch – Grow your Email List versions prior to 3.1.7 is potentially affected by CVE-2024-31349.