Description

The Email Keep WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

INFO

Published Date :

2025-03-08T06:00:05.198Z

Last Modified :

2025-03-10T17:21:54.881Z

Source :

WPScan
AFFECTED PRODUCTS

The following products are affected by CVE-2024-13825 vulnerability.

Vendors Products
Intricateweb
  • Email Keep
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-13825.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact