First published: Fri Jun 09 2023(Updated: )
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_last_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpmet Metform Elementor Contact Form Builder | <=3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0709 is a vulnerability in the Metform Elementor Contact Form Builder for WordPress that allows authenticated attackers to inject malicious code using the 'mf_last_name' shortcode.
CVE-2023-0709 affects versions up to and including 3.3.0 of the Metform Elementor Contact Form Builder for WordPress.
CVE-2023-0709 has a severity rating of 5.4, which is considered medium.
Authenticated attackers with contributor-level permissions or above can exploit CVE-2023-0709 by using the 'mf_last_name' shortcode to inject malicious code.
Yes, updating the Metform Elementor Contact Form Builder to a version beyond 3.3.0 will fix the CVE-2023-0709 vulnerability.