Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeHunk Contact Form & Lead Form Elementor Builder lead-form-builder allows Stored XSS.This issue affects Contact Form & Lead Form Elementor Builder: from n/a through <= 2.0.1.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises because the plugin does not properly neutralize user‑supplied content before storing it in the database. This omission allows an attacker to submit form data that contains malicious script, which is then persisted and rendered on the site whenever the form page is viewed. The injected code runs in the browser of any user who visits the affected page, potentially enabling a range of attacks such as defacement or the execution of additional malicious payloads. The severity of the issue stems from the fact that the malicious content is stored permanently and can affect all visitors to the form page.

Affected Systems

WordPress installations that use the ThemeHunk Contact Form & Lead Form Elementor Builder plugin in any version from its earliest release through 2.0.1. The plugin is distributed for use within the Elementor page builder environment and is commonly deployed on sites that require customizable forms.

Risk and Exploitability

The CVSS score of 7.1 indicates a moderate severity. The exploitability is high because an attacker only needs the ability to submit data to the form; no authentication or advanced techniques are required. The attack path is straightforward: submit malicious input, have it stored, and then have it executed for each subsequent page visit. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the impact could be observed in any visitor’s browser that loads the compromised form page.

Generated by OpenCVE AI on March 25, 2026 at 23:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the ThemeHunk Contact Form & Lead Form Elementor Builder plugin to the latest version available from the vendor.
  • If an immediate upgrade is not possible, disable or delete the plugin to prevent further data injection.
  • Review existing form entries stored by the plugin for hidden or suspicious script tags and remove any that appear malicious.

Generated by OpenCVE AI on March 25, 2026 at 23:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Themehunk
Themehunk contact Form & Lead Form Elementor Builder
Wordpress
Wordpress wordpress
Vendors & Products Themehunk
Themehunk contact Form & Lead Form Elementor Builder
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeHunk Contact Form & Lead Form Elementor Builder lead-form-builder allows Stored XSS.This issue affects Contact Form & Lead Form Elementor Builder: from n/a through <= 2.0.1.
Title WordPress Contact Form & Lead Form Elementor Builder plugin <= 2.0.1 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Themehunk Contact Form & Lead Form Elementor Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-25T20:13:17.628Z

Reserved: 2026-03-12T11:12:24.776Z

Link: CVE-2026-32532

cve-icon Vulnrichment

Updated: 2026-03-25T20:02:44.376Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:17:06.727

Modified: 2026-03-30T13:27:12.923

Link: CVE-2026-32532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:12:19Z

Weaknesses