The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_first_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078 - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/2907471/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7549db-9a4b-4dee-8023-d7863dc3b4c8?source=cve - Third Party Advisory |
Information
Published : 2023-06-09 06:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0708
Mitre link : CVE-2023-0708
CVE.ORG link : CVE-2023-0708
JSON object : View
Products Affected
wpmet
- metform_elementor_contact_form_builder
CWE
No CWE.