Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form fws-ajax-contact-form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through <= 1.4.1.
Published: 2025-01-15
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw that allows an attacker to inject malicious JavaScript into pages served by the Ajax Contact Form plugin. Once an attacker submits malicious content through the form, the script is persisted in the site database and executed whenever visitors load the impacted page. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of legitimate users, and defacement or content injection. The weakness is identified as CWE‑79, indicating improper input sanitization during web page generation.

Affected Systems

The affected product is the Ajax Contact Form plugin developed by Olaf Lederer. Versions from the initial release through 1.4.1 contain the flaw; any installation of these or earlier versions is susceptible.

Risk and Exploitability

The CVSS score of 6.5 reflects a moderate severity with potential for significant impact if exploited. The EPSS score of less than 1% indicates low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Attacks would most likely be carried out by submitting crafted input via the form on a publicly accessible page, leveraging the stored data to deliver malicious scripts to end users. No special conditions beyond normal web interaction are required, making this vulnerability fairly easy to exploit in a suitable environment.

Generated by OpenCVE AI on May 1, 2026 at 21:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Ajax Contact Form plugin to a supported version that addresses the XSS issue.
  • If an immediate update is not possible, restrict the form to internal or trusted users only, or temporarily disable public access to the form.
  • Configure the web application to sanitize or encode all user‑supplied content before rendering it in a page, ensuring that any remaining scripts are rendered harmless.

Generated by OpenCVE AI on May 1, 2026 at 21:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-2975 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through 1.2.5.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through 1.2.5.1. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form fws-ajax-contact-form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through <= 1.4.1.
Title WordPress Ajax Contact Form plugin <= 1.2.5.1 - Stored Cross Site Scripting (XSS) vulnerability WordPress Ajax Contact Form plugin <= 1.4.1 - Stored Cross Site Scripting (XSS) vulnerability
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Wed, 15 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Jan 2025 15:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through 1.2.5.1.
Title WordPress Ajax Contact Form plugin <= 1.2.5.1 - Stored Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:06.677Z

Reserved: 2025-01-07T21:04:45.366Z

Link: CVE-2025-22761

cve-icon Vulnrichment

Updated: 2025-01-15T19:07:40.065Z

cve-icon NVD

Status : Deferred

Published: 2025-01-15T16:15:39.053

Modified: 2026-04-23T15:23:34.137

Link: CVE-2025-22761

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T21:45:09Z

Weaknesses