The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'fname' attribute of the 'mf_thankyou' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Additionally this requires successful payment, increasing the complexity.
Metrics
Affected Vendors & Products
References
History
Sat, 23 Nov 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-06-09T05:33:23.543Z
Updated: 2024-11-23T13:18:21.937Z
Reserved: 2023-02-07T15:19:09.384Z
Link: CVE-2023-0710
Vulnrichment
Updated: 2024-08-02T05:17:50.396Z
NVD
Status : Modified
Published: 2023-06-09T06:15:53.053
Modified: 2024-11-21T07:37:40.450
Link: CVE-2023-0710
Redhat
No data.