Newsletter – Send awesome emails from WordPress

Information

Software Type Plugin
Software Slug newsletter (view on wordpress.org)
Software Status Active
Software Author satollo
Software Website www.thenewsletterplugin.com
Software Downloads 21,735,772
Software Active Installs 300,000
Software Record Last Updated September 24, 2023

10 vulnerabilities

Title CVE ID CVSS Researchers Date
Newsletter <= 7.8.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode CVE-2023-4772 6.4 Lana Codes August 17, 2023
Newsletter <= 7.6.8 - Reflected Cross-Site Scripting CVE-2023-27922 4.7 Gen Sato March 27, 2023
Newsletter <= 7.4.5 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2022-1889 5.5 PHYO WIN SHEIN May 30, 2022
Newsletter – Send awesome emails from WordPress <= 7.4.4 - Reflected Cross-Site Scripting CVE-2022-1756 6.1 PHYO WIN SHEIN May 23, 2022
Newsletter <= 6.8.1 - Reflected Cross-Site Scripting CVE-2020-35933 6.5 Ramuel Gall August 3, 2020
Newsletter <= 6.8.1 - Authenticated PHP Object Injection CVE-2020-35932 7.5 Ramuel Gall August 2, 2020
Newsletter <= 6.7.6 - Stored Cross-Site Scripting 8.3 Chevon Phillip July 12, 2020
Newsletter <= 6.5.3 - CSV Injection 5.5 Vishnupriya Ilango March 16, 2020
Newsletter <= 3.8.2 - Open Redirect 4.3 James Hooker March 30, 2015
Newsletter <= 3.2.6 - Reflected Cross-Site Scripting 6.1 Gjoko Krstic May 14, 2013

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation