Browse all 4 CVE security advisories affecting GetResponse. AI-powered Chinese analysis, POCs, and references for each vulnerability.
GetResponse is an email marketing and automation platform used for creating and managing email campaigns, landing pages, and customer journeys. Historically, the platform has been susceptible to various vulnerabilities including cross-site scripting (XSS), remote code execution (RCE), and privilege escalation flaws, often stemming from improper input validation and access control issues. While no major public security incidents have been widely documented, the four CVEs on record highlight persistent security concerns, particularly around stored XSS and authentication bypass vulnerabilities. These findings suggest a need for continued focus on secure coding practices and regular security assessments to protect user data and maintain platform integrity.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-64272 | WordPress Email marketing for WordPress by GetResponse Official plugin <= 1.5.3 - Sensitive Data Exposure vulnerability — Email marketing for WordPress by GetResponse OfficialCWE-497 | 6.5 | Medium | 2025-12-18 |
| CVE-2025-64273 | WordPress Email marketing for WordPress by GetResponse Official plugin <= 1.5.3 - Broken Access Control vulnerability — Email marketing for WordPress by GetResponse OfficialCWE-862 | 6.5 | Medium | 2025-12-18 |
| CVE-2024-31104 | WordPress GetResponse for WordPress plugin <= 5.5.33 - Cross Site Scripting (XSS) vulnerability — GetResponse for WordPressCWE-79 | 6.5 | Medium | 2024-03-31 |
| CVE-2022-35277 | WordPress GetResponse plugin <= 5.5.20 - Cross-Site Request Forgery (CSRF) vulnerability — GetResponse for WordPress (WordPress plugin)CWE-352 | 5.4 | Medium | 2022-09-09 |
This page lists every published CVE security advisory associated with GetResponse. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.