The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'fname' attribute of the 'mf_thankyou' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Additionally this requires successful payment, increasing the complexity.
History

Sat, 23 Nov 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-06-09T05:33:23.543Z

Updated: 2024-11-23T13:18:21.937Z

Reserved: 2023-02-07T15:19:09.384Z

Link: CVE-2023-0710

cve-icon Vulnrichment

Updated: 2024-08-02T05:17:50.396Z

cve-icon NVD

Status : Modified

Published: 2023-06-09T06:15:53.053

Modified: 2024-11-21T07:37:40.450

Link: CVE-2023-0710

cve-icon Redhat

No data.