2024-07-14 02:06:08 +00:00

25 lines
1.0 KiB
JSON

{
"id": "CVE-2024-3058",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-26T05:15:50.320",
"lastModified": "2024-04-26T12:58:17.720",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
},
{
"lang": "es",
"value": "El complemento de WordPress ENL Newsletter hasta la versi\u00f3n 1.0.1 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payload XSS Almacenado a trav\u00e9s de un ataque CSRF."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/",
"source": "contact@wpscan.com"
}
]
}