7.1
CVE-2023-45771
- EPSS 0.14%
- Veröffentlicht 26.03.2024 09:15:09
- Zuletzt bearbeitet 29.01.2026 20:00:54
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Contact Form With Captcha <= 1.6.8 - Cross-Site Request Forgery
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Contact Form With Captcha allows Reflected XSS.This issue affects Contact Form With Captcha: from n/a through 1.6.8.
Mögliche Gegenmaßnahme
Contact Form With Captcha: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Contact Form With Captcha
Version
*-1.6.8
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Bestwebsoft ≫ Contact Form With Captcha SwPlatformwordpress Version <= 1.6.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.352 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| audit@patchstack.com | 7.1 | 2.8 | 3.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.