Caldera Forms <= 1.5.4 - Authenticated Cross-Site Scripting (XSS)
Description | Version 1.5.4 and earlier of Caldera Forms is vulnerable to a reflected cross-site scripting vulnerability in the “edit” parameter, which is not properly escaped before being printed in an HTML attribute. An attacker can use this to craft URLs that, when clicked, result in malicious JavaScript being executed. Because Caldera Forms uses ‘wp_rest’ nonces to access the WordPress REST API – a common practice among plugin developers – this Javascript may include anything the user is capable of doing in the REST API. |
Proof of Concept |
|
Affects Plugin
fixed in version 1.5.5
|
References
URL | https://calderaforms.com/updates/caldera-forms-1-5-5/ |
Classification
Type | XSS |
OWASP Top 10 | A3: Cross-Site Scripting (XSS) |
CWE | CWE-79 |
Miscellaneous
Submitter | Will Brand |
Submitter Website | https://wrbrand.com/ |
Submitter Twitter | wrbrand |
Views | 1841 |
Verified | No |
WPVDB ID | 8940 |
Timeline
Publicly Published | 2017-09-08 (over 1 year ago) |
Added | 2017-10-30 (over 1 year ago) |
Last Updated | 2018-10-28 (4 months ago) |
Copyright & License
Copyright | All data and resources contained within this page and this web site is Copyright © The WPScan Team. |
License | Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us. |