First published: Wed Nov 17 2021(Updated: )
The Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
CodePeople Contact Form Email | <=1.3.24 |
Update to version 1.3.25 or newer.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42361 is classified as a high severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2021-42361, you should update the Contact Form Email plugin to version 1.3.25 or later.
CVE-2021-42361 affects users of the Contact Form Email plugin for WordPress versions up to and including 1.3.24.
CVE-2021-42361 is a stored cross-site scripting (XSS) vulnerability.
Yes, attackers with administrative user access can exploit CVE-2021-42361 remotely.