Input validation vulnerability in Newsletter – Send awesome emails from WordPress 3.8.2

The Newsletter plugin has a security problem which could allow someone to redirect users to another website. This is because the plugin does not properly check the data it receives from users. Specifically, when tracking link clicks, the plugin uses user data which is Base64 encoded but not properly checked. This data can be manipulated to control where the user is sent when clicking a link.

Detected in:

Newsletter – Send awesome emails from WordPress fixed vulnerable versions: >= * <= 3.8.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.