Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7396 | The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lordlinus
Lordlinus contact Us |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:lordlinus:contact_us:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Lordlinus
Lordlinus contact Us |
Mon, 10 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sun, 09 Mar 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | |
| Title | Contact Us By Lord Linus <= 2.6 - Admin+ Stored XSS via CSRF | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-10T14:10:06.800Z
Reserved: 2025-02-16T20:46:38.191Z
Link: CVE-2025-1382
Updated: 2025-03-10T14:09:24.799Z
Status : Analyzed
Published: 2025-03-09T06:15:11.837
Modified: 2025-05-21T16:54:27.347
Link: CVE-2025-1382
No data.
OpenCVE Enrichment
No data.
EUVD