First published: Sun Apr 09 2023(Updated: )
A vulnerability was found in BestWebSoft Contact Form Plugin 1.3.4 on WordPress and classified as problematic. Affected by this issue is the function bws_add_menu_render of the file bws_menu/bws_menu.php. The manipulation of the argument bwsmn_form_email leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The name of the patch is 4d531f74b4a801c805dc80360d4ea1312e9a278f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225320.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bestwebsoft Contact Form | =1.3.4 | |
=1.3.4 |
https://github.com/wp-plugins/contact-form-plugin/commit/4d531f74b4a801c805dc80360d4ea1312e9a278f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2014-125095.
CVE-2014-125095 has a severity level of medium.
The affected software for CVE-2014-125095 is BestWebSoft Contact Form Plugin 1.3.4 on WordPress.
The CWE category for CVE-2014-125095 is CWE-79.
To fix CVE-2014-125095, update the BestWebSoft Contact Form Plugin to a version that includes the necessary security patches.