vulnerability
WordPress Plugin: contact-form-to-email: CVE-2021-42361: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:M/C:P/I:P/A:N) | Nov 11, 2021 | May 15, 2025 | May 15, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:M/C:P/I:P/A:N)
Published
Nov 11, 2021
Added
May 15, 2025
Modified
May 15, 2025
Description
The Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Solution
contact-form-to-email-plugin-cve-2021-42361

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.