6.5
CVSSv2

CVE-2022-0439

Published: 07/03/2022 Updated: 07/11/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The Email Subscribers & Newsletters WordPress plugin prior to 5.3.2 does not correctly escape the `order` and `orderby` parameters to the `ajax_fetch_report_list` action, making it vulnerable to blind SQL injection attacks by users with roles as low as Subscriber. Further, it does not have any CSRF protection in place for the action, allowing an malicious user to trick any logged in user to perform the action by clicking a link.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

icegram email subscribers \\& newsletters

Github Repositories

CVE-2022-0439 - Email Subscribers & Newsletters < 5.3.2 - Subscriber+ Blind SQL injection

CVE-2022-0439 CVE-2022-0439 - Email Subscribers &amp; Newsletters &lt; 532 - Subscriber+ Blind SQL injection Must Have sqlmap installed &amp; a valid username &amp; password with subscriber+ Usage usage: CVE-2022-0439py [-h] -w URL -u USERNAME -p PASSWORD options: -h, --help show this help message and exit -w URL, --url URL URL of the Word