Lucene search

K
wpexploitDipak Panchal (th3.d1pak)WPEX-ID:58C11F1E-6EA0-468C-B974-4AEA9EB94B82
HistoryJul 24, 2023 - 12:00 a.m.

Contact Form Builder by Bit Form < 2.2.0 - Admin+ Stored XSS

2023-07-2400:00:00
Dipak Panchal (th3.d1pak)
96
bit form
contact form
builder
stored xss
html injection
vulnerability
exploit

EPSS

0.001

Percentile

24.0%

Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

1. Create a Blank form or select contact form.
2. Select Builder Tab.
3. Select the setting button.
2. Put XSS payload or HTML code in input fields like the label.

Almost all Input fields are vulnerable to XSS and HTML Injection.

EPSS

0.001

Percentile

24.0%

Related for WPEX-ID:58C11F1E-6EA0-468C-B974-4AEA9EB94B82