SendPress Newsletters

Information

Software Type Plugin
Software Slug sendpress (view on wordpress.org)
Software Status Removed
Software Author brewlabs
Software Website sendpress.com
Software Downloads 525,159
Software Active Installs 4,000
Software Record Last Updated November 20, 2024

8 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
SendPress Newsletters < 1.2 - Authenticated SQL Injection Patched CVE-2015-9448 8.8 Marcin Probola July 23, 2015
SendPress Newsletters <= 1.22.3.31 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Patched CVE-2023-5660 6.4 István Márton November 6, 2023
SendPress Newsletters < 1.20.7.13 - Authenticated Stored Cross-Site Scripting Patched 6.4 Chevon Phillip July 13, 2020
SendPress Newsletters <= 1.23.11.6 - Reflected Cross-Site Scripting Unpatched CVE-2023-47517 6.1 Le Ngoc Anh November 7, 2023
SendPress Newsletters < 1.2 - Cross-Site Scripting Patched 6.1 Marcin Probola July 23, 2015
SendPress Newsletters <= 1.23.11.6 - Missing Authorization Unpatched CVE-2023-35040 5.3 Mika August 11, 2023
SendPress Newsletters <= 1.23.11.6 - Authenticated (Administrator+) Stored Cross-Site Scripting Unpatched CVE-2023-41729 4.4 yuyudhn September 5, 2023
SendPress Newsletters <= 1.23.11.6 - Cross-Site Request Forgery Unpatched CVE-2023-41730 4.3 yuyudhn September 5, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation