Vulnerability Description
The Newsletters WordPress plugin before 4.9.3 does not properly escape user-controlled parameters when they are appended to SQL queries and shell commands, which could enable an administrator to run arbitrary commands on the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tribulant | Newsletters | < 4.9.3 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ExploitThird Party Advisory
- https://wpscan.com/vulnerability/de169fc7-f388-4abb-ab94-12522fd1ac92/ExploitThird Party Advisory
FAQ
What is CVE-2023-4797?
CVE-2023-4797 is a vulnerability with a CVSS score of 7.2 (HIGH). The Newsletters WordPress plugin before 4.9.3 does not properly escape user-controlled parameters when they are appended to SQL queries and shell commands, which could enable an administrator to run a...
How severe is CVE-2023-4797?
CVE-2023-4797 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4797?
Check the references section above for vendor advisories and patch information. Affected products include: Tribulant Newsletters.