cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwemail wemail

Direction: ascending
Jun 07, 2024

weMail – Email Marketing, Newsletter, Optin Forms, Subscribers WordPress Plugin # CVE-2024-34822

CVE, Research URL

CVE-2024-34822

Date
Jun 11, 2024
Research Description
Missing Authorization vulnerability in weDevs weMail.This issue affects weMail: from n/a through 1.14.2.
Affected versions
Min -, max -.
Status
vulnerable

weMail – Email Marketing, Newsletter, Optin Forms, Subscribers WordPress Plugin # 6a52473efb874076a39c4ea21209648e624cf1b4

Date
Sep 04, 2023
Research Description
weMail &#8211; Email Marketing, Newsletter, Optin Forms, Subscribers WordPress Plugin [wemail] < 1.14.2 WordPress weMail Plugin <= 1.14.1 is vulnerable to Cross Site Request Forgery (CSRF) No patched version is available. Lana Codes discovered and reported this Cross Site Request Forgery (CSRF) vulnerability in WordPress weMail Plugin. This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication. This vulnerability has not been known to be fixed yet.
Affected versions
Min -, max -.
Status
vulnerable
Aug 16, 2024

weMail &#8211; Email Marketing, Newsletter, Optin Forms, Subscribers WordPress Plugin # CVE-2024-43238

CVE, Research URL

CVE-2024-43238

Date
Aug 18, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs weMail allows Reflected XSS.This issue affects weMail: from n/a through 1.14.5.
Affected versions
Min -, max -.
Status
vulnerable
May 09, 2025

weMail &#8211; Email Marketing, Newsletter, Optin Forms, Subscribers WordPress Plugin # CVE-2025-47540

CVE, Research URL

CVE-2025-47540

Date
May 07, 2025
Research Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in weDevs weMail allows Retrieve Embedded Sensitive Data. This issue affects weMail: from n/a through 1.14.13.
Affected versions
Min -, max -.
Status
vulnerable