Contact Form Email Editor+ Stored Cross-Site Scriptin
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
WPVulnDB | Contact Form Email < 1.3.44 - Editor+ Stored Cross-Site Scripting | 14 Nov 202300:00 | – | wpvulndb |
Cvelist | CVE-2023-5955 Contact Form Email < 1.3.44 - Editor+ Stored Cross-Site Scripting | 11 Dec 202319:30 | – | cvelist |
Vulnrichment | CVE-2023-5955 Contact Form Email < 1.3.44 - Editor+ Stored Cross-Site Scripting | 11 Dec 202319:30 | – | vulnrichment |
NVD | CVE-2023-5955 | 11 Dec 202320:15 | – | nvd |
Patchstack | WordPress Contact Form Email Plugin < 1.3.44 is vulnerable to Cross Site Scripting (XSS) | 19 Dec 202300:00 | – | patchstack |
Prion | Cross site scripting | 11 Dec 202320:15 | – | prion |
CVE | CVE-2023-5955 | 11 Dec 202320:15 | – | cve |
1. Create a form and navigate to 'Edit' and 'Settings.'
3. Under the 'On submit action,' select the option to "Stay on the page and display a classic JavaScript alert box with a message."
3. Enter the payload is provided: `</script><script>alert(document.domain)</script>`.
4. Save and publish by visiting the page. It will execute the payload.
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo