CVE-2020-15178

In PrestaShop contactform module (prestashop/contactform) before version 4.3.0, an attacker is able to inject JavaScript while using the contact form. The `message` field was incorrectly unescaped, possibly allowing attackers to execute arbitrary JavaScript in a victim's browser.
Configurations

Configuration 1 (hide)

cpe:2.3:a:prestashop:contactform:*:*:*:*:*:prestashop:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
References () https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09 - Patch, Third Party Advisory () https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09 - Patch, Third Party Advisory
References () https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96 - Third Party Advisory () https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96 - Third Party Advisory
References () https://packagist.org/packages/prestashop/contactform - Vendor Advisory () https://packagist.org/packages/prestashop/contactform - Vendor Advisory
CVSS v2 : 4.3
v3 : 9.3
v2 : 4.3
v3 : 8.0

Information

Published : 2020-09-15 18:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15178

Mitre link : CVE-2020-15178

CVE.ORG link : CVE-2020-15178


JSON object : View

Products Affected

prestashop

  • contactform
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')