First published: Sat Jan 20 2024(Updated: )
The WPForms Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form submission parameters in all versions up to, and including, 1.8.5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPForms | <=1.8.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7063 is rated as a medium severity vulnerability due to the potential for stored cross-site scripting attacks.
To fix CVE-2023-7063, upgrade WPForms Pro to version 1.8.5.4 or later, which includes necessary security patches.
CVE-2023-7063 affects all versions of the WPForms Pro plugin for WordPress up to and including version 1.8.5.3.
With CVE-2023-7063, unauthenticated attackers can exploit the vulnerability to inject arbitrary JavaScript into forms, potentially hijacking user sessions or redirecting users.
No, user authentication is not required to exploit CVE-2023-7063, making it particularly concerning for WordPress sites using affected versions.