FormGet Contact Form 5.3 - Stored XSS
Sign up to our free email alerts service for instant vulnerability notifications!Description | The AJAX action ‘request_response’, defined in formget-contact-form/index.php line 278 is available to any logged in user. The parameter ‘value’ is accepted as valid, so long as the string ‘sideBar’ is found at a position other than 0 (i.e. prefix the payload with a space). The ‘page_id[]’ parameter can be provided in order to specify which pages to display the desired HTML/JS on. |
Affects Plugin
fixed in version 5.3.1
|
References
URL | https://research.g0blin.co.uk/g0blin-00035/ |
Classification
Type | XSS |
OWASP Top 10 | A3: Cross-Site Scripting (XSS) |
CWE | CWE-79 |
Miscellaneous
Submitter | James Hooker |
Submitter Website | https://research.g0blin.co.uk |
Submitter Twitter | g0blinResearch |
Views | 299 |
Verified | No |
WPVDB ID | 7828 |
Timeline
Publicly Published | 2015-03-07 (about 3 years ago) |
Added | 2015-03-08 (about 3 years ago) |
Last Updated | 2015-05-15 (almost 3 years ago) |
Copyright & License
Copyright | All data and resources contained within this page and this web site is Copyright © The WPScan Team. |
License | Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us. |