First published: Mon Jan 24 2022(Updated: )
The Contact Form Entries WordPress plugin before 1.1.7 does not validate, sanitise and escape the IP address retrieved via headers such as CLIENT-IP and X-FORWARDED-FOR, allowing unauthenticated attackers to perform Cross-Site Scripting attacks against logged in admins viewing the created entry
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Crmperks Contact Form Entries | <1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-25080.
The severity level of CVE-2021-25080 is medium.
An attacker can exploit CVE-2021-25080 by performing Cross-Site Scripting (XSS) attacks against logged in admins viewing the created entry.
No, authentication is not required for an attacker to exploit CVE-2021-25080.
Yes, the Contact Form Entries WordPress plugin has released version 1.1.7 which fixes the vulnerability.