First published: Sat May 18 2024(Updated: )
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘subject’ parameter in versions up to, and including, 5.1.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, and access granted by an administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fluent Forms | <5.1.17 | |
Fluent Forms Contact Form Plugin | <=5.1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4709 has a medium severity level due to its potential for Stored Cross-Site Scripting.
To fix CVE-2024-4709, update the Contact Form Plugin by Fluent Forms to version 5.1.17 or later.
CVE-2024-4709 affects versions of the Contact Form Plugin by Fluent Forms up to and including 5.1.16.
The impact of CVE-2024-4709 can allow attackers to execute malicious scripts in the context of a user's session.
No, the affected versions do not sufficiently sanitize input or escape output, leading to the vulnerability.