First published: Thu Sep 19 2024(Updated: )
The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter when a placeholder such as {email} is used for the field in versions 4.9.9 to 4.9.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mailchimp | >=4.9.9<=4.9.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8850 is classified as a medium severity vulnerability affecting the MC4WP: Mailchimp for WordPress plugin.
To fix CVE-2024-8850, update the MC4WP: Mailchimp for WordPress plugin to version 4.9.17 or higher.
CVE-2024-8850 is a Reflected Cross-Site Scripting (XSS) vulnerability.
CVE-2024-8850 affects versions 4.9.9 to 4.9.16 of the MC4WP: Mailchimp for WordPress plugin.
CVE-2024-8850 exploits insufficient input sanitization related to the 'email' parameter when using placeholders.