Lucene search

K
vulnrichmentWPScanVULNRICHMENT:CVE-2024-6223
HistoryJul 30, 2024 - 6:00 a.m.

CVE-2024-6223 Send email only on Reply to My Comment <= 1.0.6 - Reflected XSS

2024-07-3006:00:09
WPScan
github.com
3
cve-2024-6223
send email
wordpress plugin
xss
high privilege users

AI Score

6.1

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

The Send email only on Reply to My Comment WordPress plugin through 1.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Send email only on Reply to My Comment",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "semver",
        "lessThanOrEqual": "1.0.6"
      }
    ],
    "defaultStatus": "affected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:yasir:send_email_only_on_reply_to_my_comment:*:*:*:*:*:*:*:*"
    ],
    "vendor": "yasir",
    "product": "send_email_only_on_reply_to_my_comment",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.0.6"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

6.1

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-6223