Input validation vulnerability in ENL Newsletter 1.0.1

The ENL Newsletter plugin for WordPress has a security issue that allows attackers to access sensitive information from the database. This vulnerability is caused by a lack of proper preparation and escaping in the SQL query when using the ‘id’ parameter. This means that authenticated attackers with administrator access can add their own SQL queries to extract information from the database.

Detected in:

ENL Newsletter open vulnerable versions: >= * <= 1.0.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.