First published: Fri Jun 09 2023(Updated: )
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_first_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpmet Metform Elementor Contact Form Builder | <=3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0708 is a vulnerability in the Metform Elementor Contact Form Builder plugin for WordPress that allows authenticated attackers with contributor-level permissions or above to perform Cross-Site Scripting (XSS) attacks.
The severity of CVE-2023-0708 is medium, with a CVSS score of 5.4.
If you are using the Metform Elementor Contact Form Builder plugin for WordPress up to and including version 3.3.0, your site may be affected by CVE-2023-0708.
An authenticated attacker with contributor-level permissions or above can exploit CVE-2023-0708 by using the 'mf_first_name' shortcode to inject malicious code and perform Cross-Site Scripting attacks.
To mitigate the CVE-2023-0708 vulnerability, you should update the Metform Elementor Contact Form Builder plugin to a version higher than 3.3.0.