CVE-2021-24490

MEDIUM

Email Artillery < 4.1 - CSRF

Title source: rule
STIX 2.1

Description

The Email Artillery (MASS EMAIL) WordPress plugin through 4.1 does not properly check the uploaded files from the Import Emails feature, allowing arbitrary files to be uploaded. Furthermore, the plugin is also lacking any CSRF check, allowing such issue to be exploited via a CSRF attack as well. However, due to the presence of a .htaccess, denying access to everything in the folder the file is uploaded to, the malicious uploaded file will only be accessible on Web Servers such as Nginx/IIS

References (1)

Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://wpscan.com/vulnerability/4ea0127e-afef-41bf-a005-c57432f9f58c

Scores

CVSS v3 6.8
EPSS 0.0012
EPSS Percentile 31.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-434 CWE-352
Status published
Products (1)
email_artillery_project/email_artillery < 4.1
Published Sep 13, 2021
Tracked Since Feb 18, 2026