Description
The Mailgun Subscriptions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mailgun_subscription_form' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
* (semver)
Timeline
| 2025-11-25: | Vendor Notified |
| 2025-12-11: | Disclosed |
Credits
Gilang Asra Bilhadi
References
www.wordfence.com/...-9612-4651-b02d-4b68a3533d36?source=cve
plugins.trac.wordpress.org/...riptions/Subscription_Form.php
github.com/...mmits/a8b597e3a09f3a1b76436d09de434fd9bfe29f64
plugins.trac.wordpress.org/...riptions&sfp_email=&sfph_mail=
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.