Description
Cross-Site Request Forgery (CSRF) vulnerability in digitaldonkey Multilang Contact Form multilang-contact-form allows Stored XSS.This issue affects Multilang Contact Form: from n/a through <= 1.5.
Published: 2025-10-27
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a cross‑site request forgery flaw that allows a site visitor to submit form data that is stored by the Multilang Contact Form plugin without sanitization. The stored data can contain malicious script payloads, which will execute in the browsers of any users viewing the page that displays the submitted form. The impact is the possible compromise of confidentiality, integrity, and availability through injected JavaScript that can steal information or perform actions on behalf of the user when the content is rendered.

Affected Systems

The issue affects the Digital Donkey Multilang Contact Form plugin for WordPress, versions up through and including 1.5. All WordPress sites that have installed any version of this plugin 1.5 or earlier are potentially vulnerable unless the plugin is removed or patched.

Risk and Exploitability

The CVSS score of 7.1 indicates high severity. The EPSS score of less than 1% suggests that exploitation is not likely in the near term, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a faulty CSRF pathway that must be activated by having an authenticated user visit a malicious page that triggers a forged form submission. Successful exploitation would grant an attacker the ability to persist malicious scripts that execute for all visitors of the affected pages.

Generated by OpenCVE AI on April 29, 2026 at 23:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Multilang Contact Form plugin to a version newer than 1.5, which removes the CSRF weakness and sanitizes stored content.
  • If a newer version is not immediately available, remove or disable the plugin from the WordPress site to eliminate the attack surface.
  • If removal is not possible, implement additional CSRF protections on the site, such as adding nonce fields to outgoing forms and validating the Referer/Origin header on incoming POST requests, and set SameSite=Strict on authentication cookies to reduce the risk of forged requests.

Generated by OpenCVE AI on April 29, 2026 at 23:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in digitaldonkey Multilang Contact Form multilang-contact-form allows Stored XSS.This issue affects Multilang Contact Form: from n/a through <= 1.5.
Title WordPress Multilang Contact Form plugin <= 1.5 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:04.986Z

Reserved: 2025-10-24T14:24:16.561Z

Link: CVE-2025-62896

cve-icon Vulnrichment

Updated: 2025-10-27T15:20:55.092Z

cve-icon NVD

Status : Deferred

Published: 2025-10-27T02:15:48.673

Modified: 2026-04-27T18:16:28.160

Link: CVE-2025-62896

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:45:16Z

Weaknesses