ajax.functions.php in the MailUp plugin before 1.3.3 for WordPress does not properly restrict access to unspecified Ajax functions, which allows remote attackers to modify plugin settings and conduct cross-site scripting (XSS) attacks by setting the wordpress_logged_in cookie. NOTE: this is due to an incomplete fix for a similar issue that was fixed in 1.3.2.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wp-mailup | Mailup | * | 1.3.2 (including) |
Wp-mailup | Mailup | 1.0.0 (including) | 1.0.0 (including) |
Wp-mailup | Mailup | 1.1.0 (including) | 1.1.0 (including) |
Wp-mailup | Mailup | 1.1.1 (including) | 1.1.1 (including) |
Wp-mailup | Mailup | 1.1.2 (including) | 1.1.2 (including) |
Wp-mailup | Mailup | 1.1.3 (including) | 1.1.3 (including) |
Wp-mailup | Mailup | 1.2 (including) | 1.2 (including) |
Wp-mailup | Mailup | 1.3 (including) | 1.3 (including) |
Wp-mailup | Mailup | 1.3.1 (including) | 1.3.1 (including) |
Wp-mailup | Mailup | 1.21 (including) | 1.21 (including) |