header-logo
Suggest Exploit
vendor:
Newsletter Meenews Plugin
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Newsletter Meenews Plugin
Affected Version From: 5.1.2000
Affected Version To: 5.1.0 (other versions may also be affected)
Patch Exists: NO
Related CWE:
CPE: a:wordpress:newsletter_meenews:5.1.0
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Cross-Site Scripting vulnerability in Newsletter Meenews Plugin for WordPress

An attacker can exploit this vulnerability by injecting malicious script code through the 'idnews' parameter in the 'newsletter.php' script. This can lead to the execution of arbitrary script code in the browser of an unsuspecting user, potentially allowing the attacker to steal authentication credentials and launch further attacks.

Mitigation:

It is recommended to update to the latest version of the plugin to mitigate this vulnerability. Additionally, input validation and sanitization should be implemented to prevent the execution of malicious script code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/50783/info

Newsletter Meenews Plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Newsletter Meenews 5.1.0 is vulnerable; other versions may also be affected. 

http://www.example.com/[path]/wp-content/plugins/meenews/newsletter.php?idnews=[xss]