Lucene search

K
wpvulndbVaibhav RajputWPVDB-ID:71662B72-311C-42DB-86C5-A0276D25535C
HistoryFeb 20, 2023 - 12:00 a.m.

FluentSMTP < 2.2.3 - Stored XSS via Email Logs

2023-02-2000:00:00
Vaibhav Rajput
wpscan.com
6
fluentsmtp
stored xss
email logs
cross-site scripting
vulnerability
wordpress
subscribe2
smtp
mailtrap

0.001 Low

EPSS

Percentile

23.3%

The plugin does not sanitize or escape email content, making it vulnerable to stored cross-site scripting attacks (XSS) when an administrator views the email logs. This exploit requires other plugins to enable users to send emails with unfiltered HTML.

PoC

XSS Payload : Steps to reproduce: 1. Install subscribe2 plugin (https://wordpress.org/plugins/subscribe2/) 2. Install FluentSMTP 3. Configure FluentSMTP to use custom SMTP (for testing use mailtrap). 4. As another user (needs Author+ role), send an email using subscribe2 plugin with email content as xss payload. 5. View logs and click on preview icon to trigger XSS.

CPENameOperatorVersion
fluent-smtplt2.2.3

0.001 Low

EPSS

Percentile

23.3%

Related for WPVDB-ID:71662B72-311C-42DB-86C5-A0276D25535C