Filtered by vendor Codemiq
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-40202 | 1 Codemiq | 1 Wp Html Mail | 2024-11-21 | 5.4 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in Hannes Etzelstorfer // codemiq WP HTML Mail plugin <= 3.4.1 versions. | ||||
CVE-2022-0218 | 1 Codemiq | 1 Wordpress Email Template Designer | 2024-11-21 | 8.3 High |
The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site. | ||||
CVE-2021-20779 | 1 Codemiq | 1 Wordpress Email Template Designer | 2024-11-21 | 8.8 High |
Cross-site request forgery (CSRF) vulnerability in WordPress Email Template Designer - WP HTML Mail versions prior to 3.0.8 allows remote attackers to hijack the authentication of administrators via unspecified vectors. | ||||
CVE-2019-25148 | 1 Codemiq | 1 Wp Html Mail | 2024-11-21 | 6.1 Medium |
The WP HTML Mail plugin for WordPress is vulnerable to HTML injection in versions up to, and including, 2.9.0.3 due to insufficient input sanitization. This makes it possible for unauthenticated attackers to inject arbitrary HTML in pages that execute if they can successfully trick a administrator into performing an action such as clicking on a link. | ||||
CVE-2019-25144 | 1 Codemiq | 1 Wp Html Mail | 2024-11-21 | 5.4 Medium |
The WP HTML Mail plugin for WordPress is vulnerable to HTML injection in versions up to, and including, 2.2.10 due to insufficient input sanitization. This makes it possible for unauthenticated attackers to inject arbitrary HTML in pages that execute if they can successfully trick a administrator into performing an action such as clicking on a link. |
Page 1 of 1.