First published: Sat Jul 27 2024(Updated: )
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘description’ and 'btn_txt' parameters in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for attackers with the Form Manager permissions and Subscriber+ user role, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fluent Forms Contact Form Plugin | <=5.1.19 | |
Fluent Forms | <5.1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6703 has a medium severity rating due to its potential for stored cross-site scripting attacks.
CVE-2024-6703 affects all versions of the Fluent Forms Contact Form Plugin up to and including version 5.1.19.
To fix CVE-2024-6703, update the Fluent Forms Contact Form Plugin to version 5.1.20 or later.
CVE-2024-6703 is identified as a Stored Cross-Site Scripting vulnerability.
CVE-2024-6703 is vulnerable through the 'description' and 'btn_txt' parameters.