cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches formailin mailin

Direction: descending
Mar 29, 2026

Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2025-14799

CVE, Research URL

CVE-2025-14799

Date
Feb 18, 2026
Research Description
The Brevo - Email, SMS, Web Push, Chat, and more. plugin for WordPress is vulnerable to authorization bypass due to type juggling in all versions up to, and including, 3.3.0. This is due to the use of loose comparison (==) instead of strict comparison (===) when validating the installation ID in the `/wp-json/mailin/v1/mailin_disconnect` REST API endpoint. This makes it possible for unauthenticated attackers to disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings by sending a boolean `true` value for the `id` parameter, which bypasses the authorization check through PHP type juggling.
Affected versions
max 3.3.1.
Status
vulnerable
Oct 10, 2024

Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2024-8477

CVE, Research URL

CVE-2024-8477

Date
Oct 10, 2024
Research Description
The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. This is due to missing or incorrect nonce validation on the Init() function. This makes it possible for unauthenticated attackers to log out of a Brevo connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected versions
max 3.1.88.
Status
vulnerable
Aug 20, 2024

Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2024-43287

CVE, Research URL

CVE-2024-43287

Date
Aug 27, 2024
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in Brevo Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue.This issue affects Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue: from n/a through 3.1.82.
Affected versions
max 3.1.83.
Status
vulnerable
Jun 06, 2024

Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2021-24874

CVE, Research URL

CVE-2021-24874

Date
Feb 14, 2022
Research Description
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.31 does not escape the lang and pid parameter before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
Affected versions
max 3.1.31.
Status
vulnerable

Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2021-24923

CVE, Research URL

CVE-2021-24923

Date
Jan 24, 2022
Research Description
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.25 does not escape the sib-statistics-date parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
Affected versions
max 3.1.61.
Status
vulnerable

Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2024-35668

CVE, Research URL

CVE-2024-35668

Date
Jun 04, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brevo Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue allows Reflected XSS.This issue affects Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue: from n/a through 3.1.77.
Affected versions
max 3.1.78.
Status
vulnerable

Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) # CVE-2023-2472

CVE, Research URL

CVE-2023-2472

Date
Jun 05, 2023
Research Description
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.61 does not sanitise and escape a parameter before outputting it back in the admin dashboard when the WPML plugin is also active and configured, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected versions
max 3.1.78.
Status
vulnerable