The WP HTML Mail plugin for WordPress is vulnerable to HTML injection in versions up to, and including, 2.9.0.3 due to insufficient input sanitization. This makes it possible for unauthenticated attackers to inject arbitrary HTML in pages that execute if they can successfully trick a administrator into performing an action such as clicking on a link.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-11582 | The WP HTML Mail plugin for WordPress is vulnerable to HTML injection in versions up to, and including, 2.9.0.3 due to insufficient input sanitization. This makes it possible for unauthenticated attackers to inject arbitrary HTML in pages that execute if they can successfully trick a administrator into performing an action such as clicking on a link. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WP HTML Mail < 2.9.1 - HTML Injection |
Sat, 21 Dec 2024 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:16:44.291Z
Reserved: 2023-06-06T13:10:14.008Z
Link: CVE-2019-25148
Updated: 2024-08-05T03:00:19.212Z
Status : Modified
Published: 2023-06-07T02:15:10.633
Modified: 2026-04-08T19:17:32.340
Link: CVE-2019-25148
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD