WordPress Regular Subscriber Plugin 3.1.x - HTML Injection Vulnerability
WordPress Regular Subscriber plugin is prone to an HTML-injection vulnerability because of failure to sufficiently clean up user-supplied input. It allows an attacker to execute arbitrary script code in the browser in the context of the affected websites. In this way an attacker can steal cookie-based authentication credentials or control how the websites are rendered to the user. Other attacks (for the example a cross-site scripting) are also possible.