CVE-2022-0218
HIGH EXPLOITED NUCLEIWP HTML Mail <3.0.9 - Info Disclosure
Title source: llmDescription
The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.
Nuclei Templates (1)
HTML Email Template Designer < 3.1 - Stored Cross-Site Scripting
MEDIUMby hexcat
References (2)
Scores
CVSS v3
8.3
EPSS
0.6240
EPSS Percentile
98.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
VulnCheck KEV
2022-01-13
CWE
CWE-862
CWE-79
Status
published
Products (1)
codemiq/wordpress_email_template_designer
< 3.0.9
Published
Feb 04, 2022
Tracked Since
Feb 18, 2026