First published: Fri Jan 31 2025(Updated: )
The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vCitaMeetingScheduler ' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
vcita Contact Form Builder | <=2.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11886 is classified as a high-severity vulnerability due to the potential impact of stored cross-site scripting.
To remediate CVE-2024-11886, update the vcita Contact Form and Calls To Action plugin to version 2.8.0 or later.
CVE-2024-11886 can facilitate stored cross-site scripting attacks, allowing an attacker to inject malicious scripts into web pages viewed by users.
CVE-2024-11886 affects all versions of the vcita Contact Form and Calls To Action plugin up to and including version 2.7.1.
The impact of CVE-2024-11886 on affected users includes the risk of data theft, session hijacking, or otherwise malicious actions executed in the context of the user's session.