The Contact Form & SMTP Plugin by PirateForms plugin for WordPress is vulnerable to HTML injection in the ‘public/class-pirateforms-public.php’ file in versions up to, and including, 2.5.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary HTML in emails that could be used to phish unsuspecting victims.
References
Link | Resource |
---|---|
https://blog.nintechnet.com/html-injection-vulnerability-in-wordpress-pirate-forms-plugin/ | Exploit |
https://www.wordfence.com/threat-intel/vulnerabilities/id/9e34c3f6-cc84-4e45-9948-6f7fd5cba8cd?source=cve | Broken Link Third Party Advisory |
https://blog.nintechnet.com/html-injection-vulnerability-in-wordpress-pirate-forms-plugin/ | Exploit |
https://www.wordfence.com/threat-intel/vulnerabilities/id/9e34c3f6-cc84-4e45-9948-6f7fd5cba8cd?source=cve | Broken Link Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-07 02:15
Updated : 2024-11-21 04:39
NVD link : CVE-2019-25145
Mitre link : CVE-2019-25145
CVE.ORG link : CVE-2019-25145
JSON object : View
Products Affected
wpforms
- contact_form
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')