Lucene search

K
githubGitHub Advisory DatabaseGHSA-837V-6VGX-JQCC
HistoryDec 12, 2022 - 3:30 p.m.

yikes-inc-easy-mailchimp-extender Cross-site Scripting vulnerability

2022-12-1215:30:31
CWE-79
GitHub Advisory Database
github.com
12
yikes-inc-easy-mailchimp-extender
cross-site scripting
admin
add_field_to_form.php
remote attack
upgrade
patch 3662c6593aa1bb4286781214891d26de2e947695
vdb-215307

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

36.9%

A vulnerability classified as problematic has been found in yikes-inc-easy-mailchimp-extender Plugin up to 6.8.5. This affects an unknown part of the file admin/partials/ajax/add_field_to_form.php. The manipulation of the argument field_name/merge_tag/field_type/list_id leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 6.8.6 can address this issue. The name of the patch is 3662c6593aa1bb4286781214891d26de2e947695. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215307.

Affected configurations

Vulners
Node
yikesinceasy_forms_for_mailchimpRange<6.8.6wordpress
VendorProductVersionCPE
yikesinceasy_forms_for_mailchimp*cpe:2.3:a:yikesinc:easy_forms_for_mailchimp:*:*:*:*:*:wordpress:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

36.9%

Related for GHSA-837V-6VGX-JQCC