The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpplugin
Wpplugin contact Form 7 Redirect \& Thank You Page |
|
CPEs | cpe:2.3:a:wpplugin:contact_form_7_redirect_\&_thank_you_page:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpplugin
Wpplugin contact Form 7 Redirect \& Thank You Page |
Tue, 12 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Nov 2024 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | Contact Form 7 Redirect & Thank You Page <= 1.0.6 - Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-12T03:24:58.666Z
Updated: 2024-11-12T11:20:42.158Z
Reserved: 2024-11-01T14:46:34.438Z
Link: CVE-2024-10685
Vulnrichment
Updated: 2024-11-12T11:20:28.997Z
NVD
Status : Analyzed
Published: 2024-11-12T04:15:04.410
Modified: 2024-11-14T19:40:14.953
Link: CVE-2024-10685
Redhat
No data.