Page 4 of 19 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

The Contact Form Entries WordPress plugin before 1.3.0 does not validate data when its output in a CSV file, which could lead to CSV injection. El complemento de WordPress Contact Form Entries anterior a 1.3.0 no valida los datos cuando se generan en un archivo CSV, lo que podría provocar una inyección de CSV. The Contact Form Entries plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.2.9 when outputting to a CSV file. This allows low-level attackers to embed untrusted input contact forms that will be present in exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration. • https://wpscan.com/vulnerability/300ebfcd-c500-464e-b919-acfeb72593de • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Reflected Cross-Site Scripting (XSS) vulnerability in CRM Perks Forms – WordPress Form Builder <= 1.1.0 ver. Vulnerabilidad de cross site scripting (XSS) reflejado en CRM Perks Forms – WordPress Form Builder &lt;= 1.1.0 ver. The CRM Perks Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.10 due to insufficient input sanitization and output escaping in the ~/templates/sample_file.php file. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/crm-perks-forms/wordpress-crm-perks-forms-plugin-1-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Contact Form Entries WordPress plugin before 1.2.4 does not sanitise and escape various parameters, such as form_id, status, end_date, order, orderby and search before outputting them back in the admin page El plugin Contact Form Entries de WordPress versiones anteriores a 1.2.4, no sanea y escapa de varios parámetros, como form_id, status, end_date, order, orderby y search antes de devolverlos a la página de administración WordPress Contact Form Entries plugin versions prior to 1.2.4 suffer from an unauthenticated persistent cross site scripting vulnerability. • https://plugins.trac.wordpress.org/changeset/2629442 https://wpscan.com/vulnerability/c3d49271-9656-4428-8357-0d1d77b7fc63 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Contact Form Entries WordPress plugin before 1.1.7 does not validate, sanitise and escape the IP address retrieved via headers such as CLIENT-IP and X-FORWARDED-FOR, allowing unauthenticated attackers to perform Cross-Site Scripting attacks against logged in admins viewing the created entry El plugin Contact Form Entries de WordPress versiones anteriores a 1.1.7, no comprueba, sanea y escapa de la dirección IP recuperada por medio de encabezados como CLIENT-IP y X-FORWARDED-FOR, permitiendo a atacantes no autenticados llevar a cabo ataques de tipo Cross-Site Scripting contra los administradores registrados que visualizan la entrada creada WordPress CRM Form Entries versions prior to 1.1.7 appear susceptible to a cross site scripting vulnerability. • https://plugins.trac.wordpress.org/changeset/2450335 https://wpscan.com/vulnerability/acd3d98a-aab8-49be-b77e-e8c6ede171ac • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •