{"id":11680,"date":"2022-01-19T17:23:58","date_gmt":"2022-01-19T22:23:58","guid":{"rendered":"http:\/\/local.brightwhiz\/?p=11680"},"modified":"2022-01-19T17:24:00","modified_gmt":"2022-01-19T22:24:00","slug":"vulnerability-in-email-template-designer-wordpress-plugin","status":"publish","type":"post","link":"http:\/\/local.brightwhiz\/vulnerability-in-email-template-designer-wordpress-plugin\/","title":{"rendered":"Vulnerability in Email Template Designer \u2013 WP HTML Mail WordPress Plugin"},"content":{"rendered":"\n
The Wordfence Threat Intelligence team disclosed an unauthenticated XSS vulnerability in the Email Template Designer \u2013 WP HTML Mail WordPress<\/a> plugin (CVE-2022-0218<\/a>). The plugin is installed on over 20,000 sites making the risk quite significant.<\/p>\n\n\n\n WordPress Email Template Designer \u2013 WP HTML Mail<\/a> is a WordPress plugin that is used to create custom-designed WordPress emails for WooCommerce<\/a> and Easy Digital Downloads (EDD) transactional emails, contact form notifications, WordPress core emails, Ninja Forms, BuddyPress, and many more.<\/p>\n\n\n\n According to Wordfence, the flaw makes it possible for an unauthenticated attacker to inject malicious JavaScript<\/a> code into a vulnerable WordPress site. This code would then execute whenever a site administrator accessed the template editor.<\/p>\n\n\n\n Furthermore, this vulnerability also allows the attacker to modify the email template to contain arbitrary data that could be used to perform a phishing attack against anyone who received emails from the compromised site.<\/p>\n\n\n\n The exploit makes use of a vulnerability found in the plugin feature that registers two REST-API routes which are used to retrieve email template settings and update email template settings for unauthenticated users to access these endpoints.<\/p>\n\n\n\n Full disclosure details were shared with the developer, Codemiq, on January 10, 2022, with a patch to the compromised WordPress plugin<\/a> released on January 13, 2022.<\/p>\n\n\n\n The recommended minimum version for Email Template Designer \u2013 WP HTML Mail WordPress plugin is now version 3.1.<\/p>\n\n\n\n You can find more details about the Vulnerability in the Email Template Designer \u2013 WP HTML Mail WordPress plugin from this Wordfence including full details<\/a> about the insecure code.<\/p>\n","protected":false},"excerpt":{"rendered":" The Wordfence Threat Intelligence team disclosed an unauthenticated XSS vulnerability in the Email Template Designer \u2013 WP HTML Mail WordPress plugin (CVE-2022-0218). The plugin is installed on over 20,000 sites…<\/p>\n","protected":false},"author":1,"featured_media":11682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,28,16,18],"tags":[219,303,328,424,452,460,471,526,545,591,635,638,650,651],"yoast_head":"\n