Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54522 | The Contact Form & SMTP Plugin for WordPress by PirateForms WordPress plugin before 2.6.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 15 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpforms
Wpforms contact Form |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:wpforms:contact_form:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpforms
Wpforms contact Form |
Tue, 25 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 25 Mar 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Contact Form & SMTP Plugin for WordPress by PirateForms WordPress plugin before 2.6.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | |
| Title | Contact Form & SMTP Plugin for WordPress by PirateForms < 2.6.0 - Admin+ Stored XSS | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-25T13:57:42.934Z
Reserved: 2024-11-15T18:24:43.712Z
Link: CVE-2024-11273
Updated: 2025-03-25T13:44:10.796Z
Status : Analyzed
Published: 2025-03-25T06:15:38.627
Modified: 2025-05-15T19:05:33.127
Link: CVE-2024-11273
No data.
OpenCVE Enrichment
No data.
EUVD