WordPress Plugin Vulnerabilities
Contact Form and Calls To Action by vcita < 2.7.1 - Contributor+ Stored Cross-Site Scripting
Description
The plugin does not sanitize and escape the email and uid parameters in the plugin settings, which could allow users with roles as low as contributor to inject arbitrary web scripts into the settings, targeting higher-privileged users such as administrators.
Proof of Concept
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Jonas Höbenreich
Verified
No
WPVDB ID
Timeline
Publicly Published
2023-06-02 (about 2 years ago)
Added
2023-06-04 (about 2 years ago)
Last Updated
2023-07-04 (about 2 years ago)