The "CP Contact Form with PayPal" plugin before 1.2.99 for WordPress has XSS in the publishing wizard via the wp-admin/admin.php?page=cp_contact_form_paypal.php&pwizard=1 cp_contactformpp_id parameter.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/cp-contact-form-with-paypal/#developers | Third Party Advisory |
https://www.pluginvulnerabilities.com/2019/06/24/reflected-cross-site-scripting-xss-vulnerability-in-cp-contact-form-with-paypal/ | Exploit Third Party Advisory |
https://wordpress.org/plugins/cp-contact-form-with-paypal/#developers | Third Party Advisory |
https://www.pluginvulnerabilities.com/2019/06/24/reflected-cross-site-scripting-xss-vulnerability-in-cp-contact-form-with-paypal/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/cp-contact-form-with-paypal/#developers - Third Party Advisory | |
References | () https://www.pluginvulnerabilities.com/2019/06/24/reflected-cross-site-scripting-xss-vulnerability-in-cp-contact-form-with-paypal/ - Exploit, Third Party Advisory |
Information
Published : 2019-08-09 13:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14785
Mitre link : CVE-2019-14785
CVE.ORG link : CVE-2019-14785
JSON object : View
Products Affected
codepeople
- cp_contact_form_with_paypal
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')