Vulnerabilities and security researches foremail-subscribe email-subscribe
Direction: descendingNov 10, 2025
Email Subscription Popup # CVE-2025-49912
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 22, 2025
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nks Email Subscription Popup email-subscribe allows Stored XSS.This issue affects Email Subscription Popup: from n/a through <= 1.2.26.
- Affected versions
-
max 1.2.26.
- Status
-
vulnerable
Jan 26, 2025
Email Subscription Popup # CVE-2025-24587
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 24, 2025
- Research Description
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Blind SQL Injection. This issue affects Email Subscription Popup: from n/a through 1.2.23.
- Affected versions
-
max 1.2.24.
- Status
-
vulnerable
Nov 20, 2024
Email Subscription Popup # CVE-2024-11195
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 19, 2024
- Research Description
- The Email Subscription Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's print_email_subscribe_form shortcode in all versions up to, and including, 1.2.22 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 1.2.23.
- Status
-
vulnerable
Jun 07, 2024
Email Subscription Popup # CVE-2023-6527
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 06, 2023
- Research Description
- The Email Subscription Popup plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the HTTP_REFERER header in all versions up to, and including, 1.2.18 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
max 1.2.19.
- Status
-
vulnerable
Email Subscription Popup # CVE-2023-30489
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 14, 2023
- Research Description
- Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Email Subscription Popup plugin <= 1.2.16 versions.
- Affected versions
-
max 1.2.17.
- Status
-
vulnerable
Email Subscription Popup # CVE-2023-6555
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 09, 2024
- Research Description
- The Email Subscription Popup WordPress plugin before 1.2.20 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
- Affected versions
-
max 1.2.20.
- Status
-
vulnerable
Email Subscription Popup # CVE-2024-27960
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 17, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Stored XSS.This issue affects Email Subscription Popup: from n/a through 1.2.20.
- Affected versions
-
max 1.2.21.
- Status
-
vulnerable