6.1
CVSSv3

CVE-2022-0218

Published: 04/02/2022 Updated: 09/02/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated malicious users to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

codemiq wordpress email template designer

Exploits

WordPress Email Template Designer – WP HTML Mail plugin versions 309 and below suffer from a cross site scripting vulnerability ...