CVE-2024-4290

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Configurations

Configuration 1 (hide)

cpe:2.3:a:jontasc:sailthru_triggermail:*:*:*:*:*:wordpress:*:*

History

21 May 2025, 19:02

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ - () https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:jontasc:sailthru_triggermail:*:*:*:*:*:wordpress:*:*
First Time Jontasc sailthru Triggermail
Jontasc
CWE CWE-79

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ - () https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/ -

01 Aug 2024, 13:59

Type Values Removed Values Added
Summary
  • (es) El complemento de WordPress Sailthru Triggermail hasta la versión 1.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio).
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

21 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 06:15

Updated : 2025-05-21 19:02


NVD link : CVE-2024-4290

Mitre link : CVE-2024-4290

CVE.ORG link : CVE-2024-4290


JSON object : View

Products Affected

jontasc

  • sailthru_triggermail
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')