Description
Because of this vulnerability, the attackers can inject arbitrary JavaScript or HTML code.
## Solution
Update the plugin.
Affected Software
{"id": "PATCHSTACK:6F7F4BF04D0F05FA4476852A595BAD97", "vendorId": null, "type": "patchstack", "bulletinFamily": "software", "title": "WordPress Contact Bank Plugin <= 2.1.21 - Cross Site Scripting", "description": "Because of this vulnerability, the attackers can inject arbitrary JavaScript or HTML code.\r\n\n\n## Solution\n\n\r\n Update the plugin. \r\n ", "published": "2016-08-01T00:00:00", "modified": "2016-08-01T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://patchstack.com/database/vulnerability/contact-bank/wordpress-contact-bank-plugin-2-1-21-cross-site-scripting", "reporter": "N/A", "references": [" \thttp://seclists.org/fulldisclosure/2016/Aug/2"], "cvelist": [], "immutableFields": [], "lastseen": "2022-06-01T19:40:26", "viewCount": 1, "enchantments": {"score": {"value": 2.7, "vector": "NONE"}, "affected_software": {"major_version": [{"name": "contact bank", "version": 2}]}, "vulnersScore": 2.7}, "_state": {"score": 1659860190, "dependencies": 1660016401, "affected_software_major_version": 1666695388}, "_internal": {"score_hash": "f91583e5889227e084187776544828e7"}, "affectedSoftware": [{"version": "2.1.21", "operator": "le", "name": "contact bank"}], "vendor_cvss": {"score": "3.1", "severity": "Unknown severity"}, "owasp": "A3: Cross Site Scripting (XSS)", "classification": "Cross Site Scripting (XSS)"}
{}