First published: Wed Jun 07 2023(Updated: )
The Contact Form & SMTP Plugin by PirateForms plugin for WordPress is vulnerable to HTML injection in the ‘public/class-pirateforms-public.php’ file in versions up to, and including, 2.5.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary HTML in emails that could be used to phish unsuspecting victims.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPForms Contact Form | <=2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this WordPress plugin is CVE-2019-25145.
The severity of CVE-2019-25145 is high with a CVSS score of 6.1.
The affected software is the Contact Form & SMTP Plugin by PirateForms plugin for WordPress versions up to, and including, 2.5.1.
CVE-2019-25145 allows for HTML injection, which can be used by an unauthenticated attacker to inject malicious HTML code into the affected web pages, potentially leading to further attacks or unauthorized access.
To fix CVE-2019-25145, it is recommended to update the Contact Form & SMTP Plugin by PirateForms plugin for WordPress to a version above 2.5.1, which includes the necessary input sanitization and output escaping to mitigate the HTML injection vulnerability.