Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54641 | The Newsletters WordPress plugin before 4.9.3 does not properly escape user-controlled parameters when they are appended to SQL queries and shell commands, which could enable an administrator to run arbitrary commands on the server. |
Tue, 22 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-06-11T16:43:37.677Z
Reserved: 2023-09-06T14:24:22.163Z
Link: CVE-2023-4797
Updated: 2024-08-02T07:38:00.494Z
Status : Modified
Published: 2024-01-16T16:15:13.400
Modified: 2025-06-11T17:15:35.710
Link: CVE-2023-4797
No data.
OpenCVE Enrichment
No data.
EUVD