Dismissed
Permalink
CVE-2025-52750
7.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package emu2
- @LeSuisse dismissed
WordPress Emu2 plugin <= 0.83b - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juergen Schulze Emu2 emu2-email-users-2 allows Reflected XSS.This issue affects Emu2: from n/a through <= 0.83b.
References
- https://vdp.patchstack.com/database/Wordpress/Plugin/emu2-email-users-2/vulnera… vdb-entry
- https://vdp.patchstack.com/database/Wordpress/Plugin/emu2-email-users-2/vulnera… vdb-entry
- https://vdp.patchstack.com/database/Wordpress/Plugin/emu2-email-users-2/vulnera… vdb-entry
- https://patchstack.com/database/Wordpress/Plugin/emu2-email-users-2/vulnerabili… vdb-entry
Affected products
emu2-email-users-2
- =<<= 0.83b