Documentation: Home / WP Mail Log
This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
The WP Mail Log plugin for WordPress has a security issue where anyone with contributor-level access or higher can read files on the server by using the includeAttachment parameter. This vulnerabilit...
Read MoreThe WP Mail Log plugin for WordPress has a security issue that allows unauthorized changes to be made to data. This is because the check_permission() function does not have enough security measures i...
Read MoreThe WP Mail Log plugin for WordPress has a security issue called SQL Injection. This happens because the 'key' parameter is not properly handled and the SQL query is not prepared well. This allows at...
Read MoreThe WP Mail Log plugin for WordPress is not secure in versions up to and including 1.1.2. If someone with contributor access or higher uses this plugin, they could potentially upload any type of file...
Read MoreThe WP Mail Log plugin for WordPress is vulnerable to a type of cyber attack called "SQL Injection" in all versions up to and including 1.1.2. This type of attack can allow people with certain levels...
Read MoreThe WP Mail Log plugin for WordPress has a security vulnerability that can allow unauthenticated attackers to inject malicious scripts into pages. These malicious scripts can be executed whenever a u...
Read MoreThe Freemius SDK for WordPress is vulnerable to an attack known as Reflected Cross-Site Scripting. This attack is possible because of insufficient security measures in versions of the Freemius SDK up ...
Read MoreThe WP Mail Log plugin for WordPress is not secure in versions up to and including 1.0.1. This means that someone who is not authorized to do so can take control of the plugin if they can get the site...
Read More© Really Simple Plugins
CoC 70461155
Kalmarweg 14-5
9723 JG, Groningen (NL)