Description
The Email Encoder WordPress plugin before 2.3.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Published: 2026-04-20
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Email Encoder
Email Encoder email Encoder
Wordpress
Wordpress wordpress
Vendors & Products Email Encoder
Email Encoder email Encoder
Wordpress
Wordpress wordpress

Mon, 20 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Mon, 20 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Description The Email Encoder WordPress plugin before 2.3.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title Email Encoder < 2.3.4 - Admin+ Stored XSS
References

Subscriptions

Email Encoder Email Encoder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-20T13:16:26.285Z

Reserved: 2024-07-24T16:55:36.785Z

Link: CVE-2024-7083

cve-icon Vulnrichment

Updated: 2026-04-20T13:16:21.247Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T07:16:14.707

Modified: 2026-04-20T19:05:30.750

Link: CVE-2024-7083

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T15:30:06Z

Weaknesses