Plugin Vulnerability Hub
Plugin 5 known issues Latest disclosed Jan 16, 2025

EELV Newsletter Vulnerabilities

Review known vulnerability records for the WordPress plugin EELV Newsletter (`eelv-newsletter`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-23602, CVE-2024-54430 and CVE-2017-18523, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
5
High or Critical
1
Patch Coverage
100%
Last Updated
Feb 14, 2025
Priority CVE Quick Links

Fast paths into EELV Newsletter CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
5
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for EELV Newsletter so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
5 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 1 high severity finding.
Recent CVEs
CVE-2025-23602, CVE-2024-54430 and CVE-2017-18523
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for EELV Newsletter

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: No CVE-2025-23602
CVE-2025-23602: EELV Newsletter <= 4.8.2 - Reflected Cross-Site Scripting

The EELV Newsletter plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 4.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in...

Published
Jan 16, 2025
Patched Release
Not published
Affected Versions
Versions up to 4.8.2
Next Step
Open the full report for remediation notes and references.
Plugin Medium Patched: No CVE-2024-54430
CVE-2024-54430: EELV Newsletter <= 4.8.2 - Cross-Site Request Forgery

The EELV Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.8.2. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perform an unauthorized action...

Published
Dec 12, 2024
Patched Release
Not published
Affected Versions
Versions up to 4.8.2
Next Step
Open the full report for remediation notes and references.
Plugin High Patched: Yes CVE-2017-18523
CVE-2017-18523: EELV Newsletter <= 4.6.0 - Cross-Site Request Forgery

The EELV Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.6.0. This is due to missing or incorrect nonce validation in the 'eelv-newsletter/trunk/lettreinfo.php' file. This makes it possible for unauthenticated attack...

Published
May 18, 2017
Patched Release
4.6.1
Affected Versions
Versions up to 4.6.0
Next Step
Update to 4.6.1 or newer if supported.
Plugin Medium Patched: Yes CVE-2017-18522
CVE-2017-18522: EELV Newsletter < 4.6.1 - Cross-Site Scripting

The eelv-newsletter plugin before 4.6.1 for WordPress has XSS in the address book.

Published
May 18, 2017
Patched Release
4.6.1
Affected Versions
Versions before 4.6.1
Next Step
Update to 4.6.1 or newer if supported.
Plugin Medium Patched: Yes CVE-2013-10028
CVE-2013-10028: EELV Newsletter <= 3.3.0 - Reflected Cross-Site Scripting

The EELV Newsletter plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter in versions up to, and including, 3.3.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject ar...

Published
Apr 17, 2013
Patched Release
3.3.1
Affected Versions
Versions up to 3.3.0
Next Step
Update to 3.3.1 or newer if supported.