SendPress Newsletters Vulnerability (Medium) – CVE-2023-47517

SendPress Newsletters Vulnerability (Medium) – CVE-2023-47517

by | Feb 12, 2026 | Plugins

Attack Vectors

CVE-2023-47517 is a Medium-severity reflected cross-site scripting (XSS) issue in the SendPress Newsletters WordPress plugin (slug: sendpress) affecting versions up to and including 1.23.11.6. An unauthenticated attacker can attempt to inject malicious script through an unknown parameter.

This type of attack typically succeeds when a staff member is convinced to click a specially crafted link or take a related action in a browser (for example, from an email, chat message, or a spoofed internal request). Because user interaction is required, the practical risk often depends on how frequently your team clicks links while logged into WordPress or business systems.

Security Weakness

The core weakness is insufficient input sanitization and output escaping. In plain terms: the plugin does not reliably treat untrusted input as unsafe before displaying it back to a user, enabling injected script to run in the victim’s browser.

Because this is reflected XSS (not stored), the malicious content is not permanently saved on your site. However, it can still be used to target specific employees or teams with realistic, time-sensitive lures.

Technical or Business Impacts

If exploited, this issue can enable actions that undermine trust and operational integrity, such as manipulating what a user sees in their browser, capturing information the user enters into a page, or leveraging the victim’s authenticated session to perform unintended actions. The CVSS vector indicates a low-complexity, network-reachable scenario with user interaction required and a scope change, which aligns with targeted social engineering risk.

For marketing directors and executives, the business impact often shows up as brand and revenue exposure: compromised campaigns, unauthorized changes to website content or forms, lead-routing tampering, and potential compliance concerns if customer or prospect data is mishandled. Even “Medium” severity events can become high-impact incidents when they affect high-privilege users or customer-facing pages.

Recommended remediation: Update SendPress Newsletters to version 1.24.8.19 or a newer patched version. After updating, consider reviewing who has administrative access and reinforcing link-click hygiene for teams that regularly work in WordPress.

Similar Attacks

Reflected XSS has been repeatedly used to target organizations through link-based lures and session abuse. Here are a few real examples for context:

CVE-2018-8174 (Microsoft Internet Explorer scripting engine) — a widely exploited scripting vulnerability used in targeted attacks.

CVE-2019-11358 (jQuery prototype pollution) — often discussed in the context of client-side exploitation paths that can enable script-driven impacts in web applications.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers