First published: Mon Oct 02 2023(Updated: )
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin <= 7.1 versions.
Credit: audit@patchstack.com audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gopiplus Popup Contact Form | <=7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44230 is an authentication (admin+) stored Cross-Site Scripting (XSS) vulnerability in the Gopi Ramasamy Popup contact form plugin version 7.1 and below.
The severity of CVE-2023-44230 is medium, with a severity value of 4.8.
CVE-2023-44230 affects the Gopi Ramasamy Popup contact form plugin version 7.1 and below, allowing stored Cross-Site Scripting (XSS) attacks.
Yes, a fix is available for CVE-2023-44230. It is recommended to update the Gopi Ramasamy Popup contact form plugin to a version higher than 7.1.
More information about CVE-2023-44230 can be found at the following reference: [https://patchstack.com/database/vulnerability/popup-contact-form/wordpress-popup-contact-form-plugin-7-1-cross-site-scripting-xss-2?_s_id=cve].