Lucene search

K
cve[email protected]CVE-2024-4290
HistoryMay 21, 2024 - 6:15 a.m.

CVE-2024-4290

2024-05-2106:15:09
web.nvd.nist.gov
33
cve-2024-4290
sanitise
escape
settings
high privilege users
admin
stored
cross-site scripting
unfiltered_html capability
multisite setup

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

Affected configurations

Vulners
Node
sailthru_triggermailRange1.1

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Sailthru Triggermail",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThanOrEqual": "1.1"
      }
    ],
    "defaultStatus": "affected"
  }
]

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%