The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'fname' attribute of the 'mf_thankyou' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Additionally this requires successful payment, increasing the complexity.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-06-09T05:33:23.543Z
Updated: 2023-06-09T05:33:23.543Z
Reserved: 2023-02-07T15:19:09.384Z
Link: CVE-2023-0710
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-09T06:15:53.053
Modified: 2023-11-07T04:01:17.190
Link: CVE-2023-0710
JSON object: View
Redhat Information
No data.
CWE
No CWE.