Input validation vulnerability in Newsletter – Send awesome emails from WordPress 3.2.6

The Newsletter plugin for WordPress is vulnerable to a type of cyber attack called Reflected Cross-Site Scripting. This type of attack occurs when a malicious code is put into a link that can be clicked on. If a user clicks on the link, the malicious code will be executed. This vulnerability affects versions of the Newsletter plugin up to 3.2.6. The vulnerability is caused by the plugin not properly sanitizing and escaping user input. This means that attackers are able to inject malicious code into the plugin which then can be executed if someone clicks on the link.

Detected in:

Newsletter – Send awesome emails from WordPress fixed vulnerable versions: >= * <= 3.2.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.