WP Mailster 1.6.18.0 allows XSS when a victim opens a mail server's details in the mst_servers page, for a crafted server_host, server_name, or connection_parameter parameter.
References
Link | Resource |
---|---|
https://www.compass-security.com/en/research/advisories/ | Third Party Advisory |
https://www.compass-security.com/fileadmin/Research/Advisories/2021-18_CSNC-2021-018-WPMailster_XSS_CSRF.txt | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-10-21T15:44:30
Updated: 2021-10-21T15:44:30
Reserved: 2021-03-22T00:00:00
Link: CVE-2021-28975
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-10-21T16:15:07.800
Modified: 2021-10-26T02:06:48.687
Link: CVE-2021-28975
JSON object: View
Redhat Information
No data.
CWE