The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2656984/wp-html-mail/trunk/includes/class-template-designer.php | Patch Third Party Advisory |
https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-02-04T22:29:24
Updated: 2022-02-04T22:29:24
Reserved: 2022-01-13T00:00:00
Link: CVE-2022-0218
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-04T23:15:12.357
Modified: 2022-02-09T03:25:28.800
Link: CVE-2022-0218
JSON object: View
Redhat Information
No data.