An issue was discovered in the "Email Subscribers & Newsletters" plugin before 3.4.8 for WordPress. Sending an HTTP POST request to a URI with /?es=export at the end, and adding option=view_all_subscribers in the body, allows downloading of a CSV data file with all subscriber data.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://blog.threatpress.com/vulnerability-email-subscribers-plugin/ | third party advisory |
https://wordpress.org/plugins/email-subscribers/#developers | release notes |
https://www.exploit-db.com/exploits/43872/ | third party advisory vdb entry exploit |