Lucene search

K

Wp Mail Log Security Vulnerabilities

cve
cve

CVE-2022-45807

Cross-Site Request Forgery (CSRF) in WPVibes WP Mail Log plugin <= 1.0.1 versions.

8.8CVSS

8.8AI Score

0.001EPSS

2023-02-02 09:22 PM
16
cve
cve

CVE-2023-3088

The WP Mail Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that...

7.2CVSS

5.9AI Score

0.001EPSS

2023-07-12 05:15 AM
10
cve
cve

CVE-2023-51410

Unrestricted Upload of File with Dangerous Type vulnerability in WPVibes WP Mail Log.This issue affects WP Mail Log: from n/a through 1.1.2.

9.9CVSS

8.7AI Score

0.001EPSS

2023-12-29 02:15 PM
19
cve
cve

CVE-2023-5644

The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users.

7.6CVSS

7.3AI Score

0.0005EPSS

2023-12-26 07:15 PM
7
cve
cve

CVE-2023-5645

The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor.

8.8CVSS

8.9AI Score

0.001EPSS

2023-12-26 07:15 PM
10
cve
cve

CVE-2023-5672

The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file path parameters when attaching files to emails, leading to local file inclusion, and allowing an attacker to leak the contents of arbitrary files.

6.5CVSS

6.2AI Score

0.0005EPSS

2023-12-26 07:15 PM
9
cve
cve

CVE-2023-5673

The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file extensions uploading files to attach to emails, allowing attackers to upload PHP files, leading to remote code execution.

8.8CVSS

9.1AI Score

0.001EPSS

2023-12-26 07:15 PM
12
cve
cve

CVE-2023-5674

The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor.

8.8CVSS

8.9AI Score

0.001EPSS

2023-12-26 07:15 PM
12