Vulnerability Description
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.61 does not sanitise and escape a parameter before outputting it back in the admin dashboard when the WPML plugin is also active and configured, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Brevo | Newsletter\, Smtp\, Email Marketing And Subscribe | < 3.1.61 |
References
- https://wpscan.com/vulnerability/b0e7665a-c8c3-4132-b8d7-8677a90118dfExploitThird Party Advisory
- https://wpscan.com/vulnerability/b0e7665a-c8c3-4132-b8d7-8677a90118dfExploitThird Party Advisory
FAQ
What is CVE-2023-2472?
CVE-2023-2472 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.61 does not sanitise and escape a parameter before outputting it back in the admin dashboard when th...
How severe is CVE-2023-2472?
CVE-2023-2472 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2472?
Check the references section above for vendor advisories and patch information. Affected products include: Brevo Newsletter\, Smtp\, Email Marketing And Subscribe.