CVE-2024-3058

The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
Configurations

Configuration 1 (hide)

cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*

History

07 May 2025, 18:05

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/ - () https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/ - Exploit, Third Party Advisory
First Time Enl Newsletter Plugin Project
Enl Newsletter Plugin Project enl-newsletter
CPE cpe:2.3:a:enl_newsletter_plugin_project:enl-newsletter:*:*:*:*:*:wordpress:*:*
CWE CWE-352

Information

Published : 2024-04-26 05:15

Updated : 2025-05-07 18:05


NVD link : CVE-2024-3058

Mitre link : CVE-2024-3058

CVE.ORG link : CVE-2024-3058


JSON object : View

Products Affected

enl_newsletter_plugin_project

  • enl-newsletter
CWE
CWE-352

Cross-Site Request Forgery (CSRF)