First published: Tue Jul 30 2024(Updated: )
The WP Ajax Contact Form WordPress plugin through 2.2.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin users
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Ajax Contact Form | <=2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5809 has a high severity rating due to its ability to lead to Reflected Cross-Site Scripting attacks.
To fix CVE-2024-5809, update the WP Ajax Contact Form plugin to a version later than 2.2.2 where the vulnerability has been addressed.
CVE-2024-5809 affects users of the WP Ajax Contact Form plugin for WordPress versions up to and including 2.2.2.
CVE-2024-5809 is a Reflected Cross-Site Scripting (XSS) vulnerability.
Yes, CVE-2024-5809 can be exploited remotely, potentially impacting admin users through malicious requests.