The Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2021-29332 | The Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | 
Fixes
    Solution
Update to version 1.3.25 or newer.
Workaround
No workaround given by the vendor.
References
        History
                    Fri, 14 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-14T17:51:38.239Z
Reserved: 2021-10-14T00:00:00.000Z
Link: CVE-2021-42361
Updated: 2024-08-04T03:30:38.284Z
Status : Modified
Published: 2021-11-17T19:15:09.040
Modified: 2024-11-21T06:27:39.673
Link: CVE-2021-42361
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD