Lucene search

K
cvelistWPScanCVELIST:CVE-2023-6555
HistoryJan 08, 2024 - 7:00 p.m.

CVE-2023-6555 Email Subscription Popup < 1.2.20 - Reflected XSS

2024-01-0819:00:27
WPScan
www.cve.org
cve-2023-6555
email subscription
wordpress
reflected xss
parameter sanitization
cross-site scripting
high privilege users

0.0005 Low

EPSS

Percentile

17.1%

The Email Subscription Popup WordPress plugin before 1.2.20 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Email Subscription Popup",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "1.2.20"
      }
    ],
    "defaultStatus": "unaffected",
    "collectionURL": "https://wordpress.org/plugins"
  }
]

0.0005 Low

EPSS

Percentile

17.1%

Related for CVELIST:CVE-2023-6555