First published: Thu Jan 10 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in wp-contact-form/options-contactform.php in the WP-ContactForm 1.5 alpha and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) wpcf_email, (2) wpcf_subject, (3) wpcf_question, (4) wpcf_answer, (5) wpcf_success_msg, (6) wpcf_error_msg, or (7) wpcf_msg parameter to wp-admin/admin.php, or (8) the SRC attribute of an IFRAME element.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wordpress Wp-contactform | <=1.5_alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-0197 is considered medium due to the potential for remote code execution via cross-site scripting.
To fix CVE-2008-0197, upgrade to a version of the WP-ContactForm plugin later than 1.5 alpha that has addressed this vulnerability.
CVE-2008-0197 can facilitate cross-site scripting attacks that allow an attacker to inject arbitrary web scripts or HTML.
CVE-2008-0197 affects the WP-ContactForm plugin for WordPress up to version 1.5 alpha.
Yes, there are known exploits for CVE-2008-0197 that can exploit the XSS vulnerabilities in the affected WP-ContactForm plugin.