The Contact Form Check Tester WordPress plugin through 1.0.2 settings are visible to all registered users in the dashboard and are lacking any sanitisation. As a result, any registered user, such as subscriber, can leave an XSS payload in the plugin settings, which will be triggered by any user visiting them, and could allow for privilege escalation. The vendor decided to close the plugin.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/e2990a7a-d4f0-424e-b01d-ecf67cf9c9f3 - Exploit, Third Party Advisory |
Information
Published : 2021-05-06 13:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24247
Mitre link : CVE-2021-24247
CVE.ORG link : CVE-2021-24247
JSON object : View
Products Affected
mooveagency
- contact_form_check_tester
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')