The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
History

Wed, 21 May 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Lordlinus
Lordlinus contact Us
Weaknesses CWE-352
CPEs cpe:2.3:a:lordlinus:contact_us:*:*:*:*:*:wordpress:*:*
Vendors & Products Lordlinus
Lordlinus contact Us

Mon, 10 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 09 Mar 2025 06:15:00 +0000

Type Values Removed Values Added
Description The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
Title Contact Us By Lord Linus <= 2.6 - Admin+ Stored XSS via CSRF
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-03-10T14:10:06.800Z

Reserved: 2025-02-16T20:46:38.191Z

Link: CVE-2025-1382

cve-icon Vulnrichment

Updated: 2025-03-10T14:09:24.799Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-09T06:15:11.837

Modified: 2025-05-21T16:54:27.347

Link: CVE-2025-1382

cve-icon Redhat

No data.