Filtered by vendor Wpforms Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-3213 1 Wpforms 1 Wp Mail Smtp 2024-09-19 5.3 Medium
The WP Mail SMTP Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the is_print_page function in versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to disclose potentially sensitive email information.
CVE-2019-25145 1 Wpforms 1 Contact Form 2024-08-05 7.2 High
The Contact Form & SMTP Plugin by PirateForms plugin for WordPress is vulnerable to HTML injection in the ‘public/class-pirateforms-public.php’ file in versions up to, and including, 2.5.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary HTML in emails that could be used to phish unsuspecting victims.
CVE-2020-10385 1 Wpforms 1 Contact Form 2024-08-04 5.4 Medium
A stored cross-site scripting (XSS) vulnerability exists in the WPForms Contact Form (aka wpforms-lite) plugin before 1.5.9 for WordPress.
CVE-2022-3574 1 Wpforms 1 Wpforms Pro 2024-08-03 9.8 Critical
The WPForms Pro WordPress plugin before 1.7.7 does not validate its form data when generating the exported CSV, which could lead to CSV injection.
CVE-2023-52209 1 Wpforms 1 Wpforms User Registration 2024-08-02 8 High
Improper Privilege Management vulnerability in WPForms, LLC. WPForms User Registration allows Privilege Escalation.This issue affects WPForms User Registration: from n/a through 2.1.0.
CVE-2023-30500 1 Wpforms 2 Contact Form, Wpforms 2024-08-02 5.8 Medium
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPForms WPForms Lite (wpforms-lite), WPForms WPForms Pro (wpforms) plugins <= 1.8.1.2 versions.
CVE-2023-7063 1 Wpforms 1 Wpforms 2024-08-02 7.2 High
The WPForms Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form submission parameters in all versions up to, and including, 1.8.5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.