The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.
Metrics
Affected Vendors & Products
References
History
Mon, 10 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-10T14:54:50.879Z
Reserved: 2022-01-13T00:00:00.000Z
Link: CVE-2022-0218

Updated: 2024-08-02T23:18:42.815Z

Status : Modified
Published: 2022-02-04T23:15:12.357
Modified: 2024-11-21T06:38:09.953
Link: CVE-2022-0218

No data.