Description
The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32839 | The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin |
References
History
Wed, 21 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jontasc
Jontasc sailthru Triggermail |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:jontasc:sailthru_triggermail:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Jontasc
Jontasc sailthru Triggermail |
Wed, 19 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-19T13:46:14.307Z
Reserved: 2024-04-27T03:08:32.726Z
Link: CVE-2024-4289
Updated: 2024-08-01T20:33:53.242Z
Status : Analyzed
Published: 2024-05-21T06:15:09.517
Modified: 2025-05-21T19:01:52.173
Link: CVE-2024-4289
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD