First published: Tue Jan 09 2024(Updated: )
The Formidable Forms – Contact Form, Survey, Quiz, Payment, Calculator Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field label and description field label parameter in all versions up to 6.7 (inclusive) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this only affects multi-site installations and installations where unfiltered_html has been disabled. However, in the formidable settings admins can extend form creation, deletion and other management permissions to other user types, which makes it possible for this vulnerability to be exploited by lower level user types as long as they have been granted the proper permissions.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Formidable Forms | <=6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6842 is considered a medium severity vulnerability due to the potential for Stored Cross-Site Scripting.
To fix CVE-2023-6842, update the Formidable Forms plugin to version 6.8 or higher which addresses the vulnerability.
All versions of the Formidable Forms plugin up to and including 6.7 are affected by CVE-2023-6842.
CVE-2023-6842 is a Stored Cross-Site Scripting vulnerability.
CVE-2023-6842 involves the name field label and description field label parameters.