Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SendPulse SendPulse Email Marketing Newsletter sendpulse-email-marketing-newsletter allows Stored XSS.This issue affects SendPulse Email Marketing Newsletter: from n/a through <= 2.1.6.
Published: 2025-05-07
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an instance of Stored Cross‑Site Scripting (XSS) where unfiltered user input is rendered in a web page without proper encoding. This flaw allows an attacker to inject malicious scripts that will execute when any user views the affected page. The consequence is that the attacker can steal session cookies, deface content, redirect users, or conduct further attacks such as phishing or botnet control. The weakness is classified as CWE‑79.

Affected Systems

The issue affects the WordPress plugin SendPulse Email Marketing Newsletter, specifically all released versions up to and including 2.1.6. Users running any of these earlier releases are vulnerable and should verify the plugin version and apply remediation.

Risk and Exploitability

The CVSS score of 6.5 places this vulnerability in the medium severity range. The EPSS score of less than 1% indicates a very low probability of exploitation at present, and the flaw is not listed in the CISA KEV catalog. Nonetheless, an attacker could exploit the flaw by sending a crafted payload through the plugin’s input fields, which the plugin stores and later returns in a page view, resulting in script execution in the victim’s browser. The attack vector is web‑based and requires access to the WordPress administration interface or at least to any user who can trigger the affected pages.

Generated by OpenCVE AI on April 30, 2026 at 13:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SendPulse Email Marketing Newsletter to version 2.1.7 or later, which removes the stored XSS flaw.
  • If an upgrade cannot be performed immediately, disable the SendPulse plugin or restrict access to the pages that accept the stored input so that no attacker‑controlled data can be rendered.
  • Implement application‑level input validation and output encoding on any fields that interact with the plugin, ensuring that special characters are escaped before rendering.
  • Apply a generic XSS filter or web application firewall rule to block script payloads targeting the affected plugin pathways.

Generated by OpenCVE AI on April 30, 2026 at 13:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13789 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SendPulse SendPulse Email Marketing Newsletter allows Stored XSS. This issue affects SendPulse Email Marketing Newsletter: from n/a through 2.1.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SendPulse SendPulse Email Marketing Newsletter allows Stored XSS. This issue affects SendPulse Email Marketing Newsletter: from n/a through 2.1.6. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SendPulse SendPulse Email Marketing Newsletter sendpulse-email-marketing-newsletter allows Stored XSS.This issue affects SendPulse Email Marketing Newsletter: from n/a through <= 2.1.6.
Title WordPress SendPulse Email Marketing Newsletter <= 2.1.6 - Cross Site Scripting (XSS) Vulnerability WordPress SendPulse Email Marketing Newsletter plugin <= 2.1.6 - Cross Site Scripting (XSS) Vulnerability
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00034}

epss

{'score': 0.00039}


Mon, 12 May 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Sendpulse
Sendpulse sendpulse Email Marketing Newsletter
CPEs cpe:2.3:a:sendpulse:sendpulse_email_marketing_newsletter:*:*:*:*:*:wordpress:*:*
Vendors & Products Sendpulse
Sendpulse sendpulse Email Marketing Newsletter

Wed, 07 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 May 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SendPulse SendPulse Email Marketing Newsletter allows Stored XSS. This issue affects SendPulse Email Marketing Newsletter: from n/a through 2.1.6.
Title WordPress SendPulse Email Marketing Newsletter <= 2.1.6 - Cross Site Scripting (XSS) Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Sendpulse Sendpulse Email Marketing Newsletter
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:44.672Z

Reserved: 2025-05-07T09:40:00.788Z

Link: CVE-2025-47547

cve-icon Vulnrichment

Updated: 2025-05-07T17:20:19.825Z

cve-icon NVD

Status : Modified

Published: 2025-05-07T15:16:11.517

Modified: 2026-04-23T15:30:27.773

Link: CVE-2025-47547

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T13:30:15Z

Weaknesses