First published: Sat Apr 27 2024(Updated: )
The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a user's display name autofilled into forms in all versions up to, and including, 1.15.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
10Web Form Maker | <=1.15.24 | |
<1.15.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2258 is considered a moderate severity vulnerability due to the risk of stored cross-site scripting.
To fix CVE-2024-2258, update the 10Web Form Maker plugin to the latest version beyond 1.15.24.
CVE-2024-2258 affects all versions of the 10Web Form Maker plugin up to and including 1.15.24.
CVE-2024-2258 can enable attackers to perform stored cross-site scripting attacks through user input that is not properly sanitized.
Yes, CVE-2024-2258 puts user data at risk by allowing malicious scripts to be executed in the context of a victim's browser.