First published: Fri Jun 09 2023(Updated: )
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'fname' attribute of the 'mf_thankyou' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Additionally this requires successful payment, increasing the complexity.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpmet Metform Elementor Contact Form Builder | <=3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0710 is medium, with a severity value of 5.4.
The vulnerability in the Metform Elementor Contact Form Builder for WordPress CVE-2023-0710 allows authenticated attackers with contributor-level permissions to execute cross-site scripting attacks using the 'fname' attribute of the 'mf_thankyou' shortcode to display unescaped form submissions.
Versions up to and including 3.3.0 of the Metform Elementor Contact Form Builder for WordPress are affected by CVE-2023-0710.
Update your Metform Elementor Contact Form Builder for WordPress to a version beyond 3.3.0 to fix the vulnerability CVE-2023-0710.
For more information about CVE-2023-0710 you can refer to the following references: [Reference 1](https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078) and [Reference 2](https://www.wordfence.com/threat-intel/vulnerabilities/id/89a98053-33c7-4e75-87a1-0f483a990641?source=cve)