Input validation vulnerability in Newsletter – Send awesome emails from WordPress 7.6.8

. The Newsletter plugin for WordPress, used in versions up to and including 7.6.8, may be vulnerable to a type of malicious attack called Reflected Cross-Site Scripting. This type of attack is possible because of insufficient input sanitization and output escaping. If someone is able to trick a victim into clicking a link, they may be able to inject web scripts into pages that execute. Older browsers are more likely to be affected by this issue as newer browsers typically urlencode the REQUEST_URI parameter by default.

Detected in:

Newsletter – Send awesome emails from WordPress fixed vulnerable versions: >= * <= 7.6.8

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.