The Contact Form Builder by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
WPVulnDB | Contact Form Builder by vcita < 4.10.2 - Contributor+ Stored Cross-Site Scripting | 2 Jun 202300:00 | – | wpvulndb |
NVD | CVE-2023-2300 | 3 Jun 202305:15 | – | nvd |
wpexploit | Contact Form Builder by vcita < 4.10.2 - Contributor+ Stored Cross-Site Scripting | 2 Jun 202300:00 | – | wpexploit |
Patchstack | WordPress Contact Form Builder by vcita Plugin <= 4.10.2 is vulnerable to Cross Site Scripting (XSS) | 5 Jun 202300:00 | – | patchstack |
Prion | Cross site scripting | 3 Jun 202305:15 | – | prion |
Cvelist | CVE-2023-2300 | 3 Jun 202304:35 | – | cvelist |
Vulnrichment | CVE-2023-2300 | 3 Jun 202304:35 | – | vulnrichment |
Wordfence Blog | Wordfence Intelligence Weekly WordPress Vulnerability Report (May 29, 2023 to June 4, 2023) | 8 Jun 202313:39 | – | wordfence |
[
{
"vendor": "eyale-vc",
"product": "Contact Form Builder by vcita",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "4.9.1",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo