First published: Thu Jan 16 2025(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mahesh Bisen Contact Form 7 – CCAvenue Add-on allows Reflected XSS.This issue affects Contact Form 7 – CCAvenue Add-on: from n/a through 1.0.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Contact Form 7 – CCAvenue Add-on | <=1.0 | |
WordPress Contact Form 7 | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-23623 is classified as high due to its potential for reflected cross-site scripting attacks.
To fix CVE-2025-23623, update the Mahesh Bisen Contact Form 7 – CCAvenue Add-on to the latest version that addresses the vulnerability.
CVE-2025-23623 affects the Mahesh Bisen Contact Form 7 – CCAvenue Add-on versions up to and including 1.0.
Exploiting CVE-2025-23623 allows attackers to execute arbitrary JavaScript in the context of the affected user’s browser.
Mitigation for CVE-2025-23623 should focus on applying patches and ensuring input is properly sanitized.