Vulnerabilities and security researches formailin mailin
Direction: ascendingJun 06, 2024
Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2021-24874
- CVE, Research URL
- Home page URL
- Date
- Feb 14, 2022
- Research Description
- The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.31 does not escape the lang and pid parameter before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
- Affected versions
-
max 3.1.31.
- Status
-
vulnerable
Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2021-24923
- CVE, Research URL
- Home page URL
- Date
- Jan 24, 2022
- Research Description
- The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.25 does not escape the sib-statistics-date parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
- Affected versions
-
max 3.1.61.
- Status
-
vulnerable
Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2024-35668
- CVE, Research URL
- Home page URL
- Date
- Jun 04, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brevo Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue allows Reflected XSS.This issue affects Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue: from n/a through 3.1.77.
- Affected versions
-
max 3.1.78.
- Status
-
vulnerable
Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2023-2472
- CVE, Research URL
- Home page URL
- Date
- Jun 05, 2023
- Research Description
- The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.61 does not sanitise and escape a parameter before outputting it back in the admin dashboard when the WPML plugin is also active and configured, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
- Affected versions
-
max 3.1.78.
- Status
-
vulnerable
Aug 20, 2024
Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2024-43287
- CVE, Research URL
- Home page URL
- Date
- Aug 27, 2024
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Brevo Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue.This issue affects Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue: from n/a through 3.1.82.
- Affected versions
-
max 3.1.83.
- Status
-
vulnerable
Oct 10, 2024
Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2024-8477
- CVE, Research URL
- Home page URL
- Date
- Oct 10, 2024
- Research Description
- The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. This is due to missing or incorrect nonce validation on the Init() function. This makes it possible for unauthenticated attackers to log out of a Brevo connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
- Affected versions
-
max 3.1.88.
- Status
-
vulnerable
Mar 29, 2026
Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2025-14799
- CVE, Research URL
- Home page URL
- Date
- Feb 18, 2026
- Research Description
- The Brevo - Email, SMS, Web Push, Chat, and more. plugin for WordPress is vulnerable to authorization bypass due to type juggling in all versions up to, and including, 3.3.0. This is due to the use of loose comparison (==) instead of strict comparison (===) when validating the installation ID in the `/wp-json/mailin/v1/mailin_disconnect` REST API endpoint. This makes it possible for unauthenticated attackers to disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings by sending a boolean `true` value for the `id` parameter, which bypasses the authorization check through PHP type juggling.
- Affected versions
-
max 3.3.1.
- Status
-
vulnerable