← Back to CVEs
CVE-2022-0439
HIGH8.8
Description
The Email Subscribers & Newsletters WordPress plugin before 5.3.2 does not correctly escape the `order` and `orderby` parameters to the `ajax_fetch_report_list` action, making it vulnerable to blind SQL injection attacks by users with roles as low as Subscriber. Further, it does not have any CSRF protection in place for the action, allowing an attacker to trick any logged in user to perform the action by clicking a link.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/7/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
icegram:email_subscribers_\&_newsletters
Weaknesses (CWE)
CWE-89CWE-352
References
https://wpscan.com/vulnerability/729d3e67-d081-4a4e-ac1e-f6b0a184f095(contact@wpscan.com)
https://wpscan.com/vulnerability/729d3e67-d081-4a4e-ac1e-f6b0a184f095(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.