The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CVE ID: CVE-2024-4289
Vendor: Unknown
Product: Sailthru Triggermail
EPSS Score: 0.03% (probability of being exploited)
EPSS Percentile: 5.96% (scored less or equal to compared to others)
EPSS Date: 2025-04-17 (when was this score calculated)
SSVC Exploitation: poc
SSVC Technical Impact: partial
SSVC Automatable: false