The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings and is missing CSRF protection which could allow subscribers to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Metrics
Affected Vendors & Products
References
History
Thu, 12 Jun 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jontasc
Jontasc sailthru Triggermail |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:jontasc:sailthru_triggermail:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Jontasc
Jontasc sailthru Triggermail |
Tue, 20 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 15 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings and is missing CSRF protection which could allow subscribers to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | |
Title | Sailthru Triggermail < 1.1 - Subscriber+ Stored XSS | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published: 2025-05-15T20:06:47.658Z
Updated: 2025-05-20T19:36:52.199Z
Reserved: 2024-11-12T13:29:28.770Z
Link: CVE-2024-11141

Updated: 2025-05-19T20:37:06.925Z

Status : Analyzed
Published: 2025-05-15T20:15:34.057
Modified: 2025-06-12T14:32:27.603
Link: CVE-2024-11141

No data.