logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-6621

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-6621

Description:
The POST SMTP WordPress plugin before 2.8.7 does not sanitise and escape the msg parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Last updated date:
01/09/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/09/2024
Reference url to background

https://wpscan.com/vulnerability/b49ca336-5bc2-4d72-a9a5-b8c020057928

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy