The plugin does not escape some of its form fields before outputting them in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Create/Edit a form and put the following payload in a Filed Name or Default Value; “style=animation-name:rotation onanimationstart=alert(/XSS/)// yo=”
CPE | Name | Operator | Version |
---|---|---|---|
lead-form-builder | lt | 1.7.0 |