Description
WordPress Plugin Subscribe to Comments is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied data. Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials; other attacks are also possible. WordPress Plugin Subscribe to Comments versions prior to 2.0.8 are vulnerable.
Remediation
Update to plugin version 2.1 or latest
References
Related Vulnerabilities
WordPress Plugin WP Hotel Booking Cross-Site Request Forgery (1.10.1)
Envoy Proxy Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2021-32780)
Apache Tomcat URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2023-41080)
WordPress Plugin Print My Blog-Print, PDF, & eBook Converter Server-Side Request Forgery (1.6.5)