CVE-2023-6621

CVSS 3.1 Score 6.1 of 10 (medium)

Details

Published Jan 3, 2024
Updated: Jan 9, 2024
CWE ID 79

Summary

CVE-2023-6621 is a vulnerability that affects the POST SMTP WordPress plugin versions before 2.8.7. This vulnerability allows for Reflected Cross-Site Scripting, which could be exploited against high privilege users like admins. The msg parameter is not properly sanitised and escaped before being outputted on the page, leaving it susceptible to attacks. To remediate this vulnerability, users should update their plugin to version 2.8.7 or later. The potential danger of this vulnerability lies in the ability for attackers to execute malicious scripts on the affected WordPress site, potentially leading to unauthorized access and compromise of sensitive data.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-6621 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions