Lucene search

K
wpvulndbMohamed AzarudheenWPVDB-ID:1B5FCE7E-14FC-4548-8747-96FDD58FDD98
HistoryNov 14, 2023 - 12:00 a.m.

Contact Form Email < 1.3.44 - Editor+ Stored Cross-Site Scripting

2023-11-1400:00:00
Mohamed Azarudheen
wpscan.com
7
contact form email
editor+
stored cross-site scripting
vulnerability
high privilege users
admin
unfiltered_html
capability
multisite setup

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Description The plugin does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

PoC

1. Create a form and navigate to ‘Edit’ and ‘Settings.’ 3. Under the ‘On submit action,’ select the option to “Stay on the page and display a classic JavaScript alert box with a message.” 3. Enter the payload is provided: `alert(document.domain)

CPENameOperatorVersion
eq1.3.44

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Related for WPVDB-ID:1B5FCE7E-14FC-4548-8747-96FDD58FDD98