cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches formailarchiver mailarchiver

Direction: ascending
Jun 06, 2024

MailArchiver # CVE-2023-3136

CVE, Research URL

CVE-2023-3136

Application

MailArchiver

Date
Aug 30, 2023
Research Description
The MailArchiver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 2.11.0.
Status
vulnerable
Apr 14, 2026

MailArchiver # CVE-2026-2721

CVE, Research URL

CVE-2026-2721

Application

MailArchiver

Date
Mar 07, 2026
Research Description
The MailArchiver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Affected versions
max 4.5.0.
Status
vulnerable
Apr 15, 2026

MailArchiver # CVE-2026-2831

CVE, Research URL

CVE-2026-2831

Application

MailArchiver

Date
Feb 27, 2026
Research Description
The MailArchiver plugin for WordPress is vulnerable to SQL Injection via the ‘logid’ parameter in all versions up to, and including, 4.5.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 4.5.1.
Status
vulnerable