Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formerly Sendinblue) Vulnerability – Reflected Cross-Site Scripting – CVE-2024-35668 | WordPress Plugin Vulnerability Report
Plugin Name: Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formerly Sendinblue)
Key Information:
- Software Type: Plugin
- Software Slug: mailin
- Software Status: Active
- Software Author: neeraj_slit
- Software Downloads: 4,539,519
- Active Installs: 100,000
- Last Updated: June 12, 2024
- Patched Versions: 3.1.78
- Affected Versions: <= 3.1.77
Vulnerability Details:
- Name: Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue <= 3.1.77
- Title: Reflected Cross-Site Scripting
- Type:
- CVE: CVE-2024-35668
- CVSS Score: 6.1
- Publicly Published: June 3, 2024
- Researcher: Rafie Muhammad - Patchstack
- Description: The plugin is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.1.77 due to insufficient input sanitization and output escaping. Attackers can exploit this to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Summary:
The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo plugin for WordPress has a vulnerability in versions up to and including 3.1.77 that allows unauthenticated attackers to execute Reflected Cross-Site Scripting attacks. This vulnerability has been patched in version 3.1.78.
Detailed Overview:
The vulnerability, identified as CVE-2024-35668, results from inadequate input sanitization and output escaping, primarily affecting the handling of user-generated content. Attackers can exploit this vulnerability by tricking users into clicking on malicious links, leading to the execution of arbitrary scripts, compromising website security and potentially user data.
Advice for Users:
- Immediate Action: Users are strongly encouraged to update the Newsletter, SMTP, Email marketing and Subscribe forms by Brevo plugin to version 3.1.78 or later to mitigate the risk of exploitation.
- Check for Signs of Vulnerability: Website owners should monitor their websites for any unusual activity, unexpected redirects, or suspicious links, which may indicate a compromise.
- Alternate Plugins: While awaiting the patch, consider using alternative plugins offering similar functionality to minimize exposure to vulnerabilities.
- Stay Updated: Regularly update all installed plugins to their latest versions to ensure ongoing protection against vulnerabilities and maintain website security.
Conclusion:
The proactive response from the plugin developers in promptly addressing this vulnerability underscores the critical importance of timely updates in safeguarding WordPress installations. Users are strongly advised to ensure they are running version 3.1.78 or later to effectively secure their WordPress websites.
References:
Detailed Report:
Staying Secure
Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.
Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.
Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.