The plugin does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admin.
CPE | Name | Operator | Version |
---|---|---|---|
woocommerce-follow-up-emails | lt | 4.9.50 |
patchstack.com/database/vulnerability/woocommerce-follow-up-emails/wordpress-woocommerce-follow-up-emails-plugin-4-9-40-reflected-cross-site-scripting-xss-vulnerability
www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce-follow-up-emails/woocommerce-follow-up-emails-4940-reflected-cross-site-scripting