The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings and is missing CSRF protection which could allow subscribers to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
History

Thu, 12 Jun 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Jontasc
Jontasc sailthru Triggermail
Weaknesses CWE-79
CPEs cpe:2.3:a:jontasc:sailthru_triggermail:*:*:*:*:*:wordpress:*:*
Vendors & Products Jontasc
Jontasc sailthru Triggermail

Tue, 20 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings and is missing CSRF protection which could allow subscribers to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title Sailthru Triggermail < 1.1 - Subscriber+ Stored XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-05-15T20:06:47.658Z

Updated: 2025-05-20T19:36:52.199Z

Reserved: 2024-11-12T13:29:28.770Z

Link: CVE-2024-11141

cve-icon Vulnrichment

Updated: 2025-05-19T20:37:06.925Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:15:34.057

Modified: 2025-06-12T14:32:27.603

Link: CVE-2024-11141

cve-icon Redhat

No data.