📦 Wp Mailster

by Wpmailster

🔍 What is Wp Mailster?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-24598

HIGH CVSS 7.1 Feb 4, 2025

This vulnerability allows attackers to inject malicious scripts into web pages generated by WP Mailster, which could execute in victims' browsers when they visit specially crafted URLs. It affects all...

CVE-2025-24559

HIGH CVSS 7.1 Feb 3, 2025

This vulnerability allows attackers to inject malicious scripts into web pages generated by WP Mailster WordPress plugin. When users visit specially crafted URLs, their browsers execute attacker-contr...

CVE-2024-53807

HIGH CVSS 8.5 Dec 6, 2024

This SQL injection vulnerability in the WP Mailster WordPress plugin allows attackers to execute arbitrary SQL commands through specially crafted inputs. It affects all WP Mailster installations from ...

CVE-2024-53804

HIGH CVSS 7.5 Dec 6, 2024

This vulnerability in WP Mailster WordPress plugin exposes sensitive data embedded in sent emails or communications. Attackers can retrieve confidential information that should remain hidden. All Word...

CVE-2025-22303

MEDIUM CVSS 5.3 Jan 7, 2025

This vulnerability in WP Mailster WordPress plugin allows attackers to retrieve embedded sensitive data from sent emails. It affects all WP Mailster installations from unknown versions through 1.8.17....

CVE-2024-54355

MEDIUM CVSS 4.3 Dec 16, 2024

This Cross-Site Request Forgery (CSRF) vulnerability in the WP Mailster WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. It affects all WP Ma...

CVE-2024-53803

MEDIUM CVSS 6.5 Dec 6, 2024

This CVE describes a missing authorization vulnerability in the WP Mailster WordPress plugin that allows attackers to bypass access controls. Attackers can exploit incorrectly configured security leve...

CVE-2024-11782

MEDIUM CVSS 6.4 Dec 3, 2024

The WP Mailster WordPress plugin has a stored XSS vulnerability that allows authenticated attackers with contributor-level access or higher to inject malicious scripts into website pages. These script...