Vulnerabilities and security researches forenl-newsletter enl-newsletter
Direction: descendingJun 10, 2024
ENL Newsletter # CVE-2024-3058
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 26, 2024
- Research Description
- The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
ENL Newsletter # CVE-2024-3059
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 26, 2024
- Research Description
- The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF checks in some places, which could allow attackers to make logged in admins delete arbitrary Campaigns via a CSRF attack
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
ENL Newsletter # CVE-2014-4939
- CVE, Research URL
- Home page URL
- Application
- Date
- Jul 12, 2014
- Research Description
- SQL injection vulnerability in the ENL Newsletter (enl-newsletter) plugin 1.0.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in the enl-add-new page to wp-admin/admin.php.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
ENL Newsletter # CVE-2024-3060
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 26, 2024
- Research Description
- The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks
- Affected versions
-
Min -, max -.
- Status
-
vulnerable