The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Vendor | Product | Version | CPE |
---|---|---|---|
* | sailthru_triggermail | * | cpe:2.3:a:*:sailthru_triggermail:*:*:*:*:*:wordpress:*:* |
[
{
"vendor": "Unknown",
"product": "Sailthru Triggermail",
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "1.1"
}
],
"defaultStatus": "affected"
}
]