The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
Metrics
Affected Vendors & Products
References
History
Wed, 21 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lordlinus
Lordlinus contact Us |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:lordlinus:contact_us:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Lordlinus
Lordlinus contact Us |
Mon, 10 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Sun, 09 Mar 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | |
Title | Contact Us By Lord Linus <= 2.6 - Admin+ Stored XSS via CSRF | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-10T14:10:06.800Z
Reserved: 2025-02-16T20:46:38.191Z
Link: CVE-2025-1382

Updated: 2025-03-10T14:09:24.799Z

Status : Analyzed
Published: 2025-03-09T06:15:11.837
Modified: 2025-05-21T16:54:27.347
Link: CVE-2025-1382

No data.