Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-20361SQL Injection in Email Subscribers Newsletters

CWE-89SQL Injection4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
28.1%
top 3.51%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 8
Latest updateMay 24

Description

There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-3m22-3wj5-cpwf: There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 42022-05-24
CVEList
CVE-2019-20361: There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 42020-01-08

💥Exploits & PoCs

1
Exploit-DB
WordPress Plugin Email Subscribers & Newsletters 4.2.2 - 'hash' SQL Injection (Unauthenticated)2020-07-26
CVE-2019-20361 — SQL Injection | cvebase