First published: Wed Mar 26 2025(Updated: )
The SH Email Alert plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'mid' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
SH Email Alert | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2165 is classified as a high severity vulnerability due to its potential to allow unauthenticated attackers to execute malicious scripts.
To fix CVE-2025-2165, update the SH Email Alert plugin to a version beyond 1.0 that includes proper input sanitization and output escaping.
All users of the SH Email Alert plugin for WordPress up to and including version 1.0 are affected by CVE-2025-2165.
CVE-2025-2165 is a Reflected Cross-Site Scripting (XSS) vulnerability.
Yes, CVE-2025-2165 can potentially lead to account compromise by allowing attackers to inject malicious scripts into the website.