Description

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

INFO

Published Date :

2024-05-21T06:00:02.415Z

Last Modified :

2024-08-01T20:33:53.097Z

Source :

WPScan
AFFECTED PRODUCTS

The following products are affected by CVE-2024-4290 vulnerability.

Vendors Products
Jontasc
  • Sailthru Triggermail
Jontascher
  • Sailthru Triggermail
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-4290.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact