Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54523 | The Contact Form & SMTP Plugin for WordPress by PirateForms WordPress plugin before 2.6.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 15 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpforms
Wpforms pirate Forms |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:wpforms:pirate_forms:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpforms
Wpforms pirate Forms |
Tue, 25 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 25 Mar 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Contact Form & SMTP Plugin for WordPress by PirateForms WordPress plugin before 2.6.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | |
| Title | Contact Form & SMTP Plugin for WordPress by PirateForms < 2.6.0 - Admin+ Stored XSS | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-25T13:57:50.281Z
Reserved: 2024-11-15T18:24:40.478Z
Link: CVE-2024-11272
Updated: 2025-03-25T13:44:13.596Z
Status : Analyzed
Published: 2025-03-25T06:15:38.530
Modified: 2025-05-15T19:06:46.980
Link: CVE-2024-11272
No data.
OpenCVE Enrichment
No data.
EUVD