CVE-2023-5530 (GCVE-0-2023-5530)

Vulnerability from cvelistv5 – Published: 2023-11-06 20:41 – Updated: 2024-08-02 07:59
VLAI?
Summary
The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Unknown Ninja Forms Contact Form Affected: 0 , < 3.6.34 (custom)
Create a notification for this product.
Credits
Jonathan Zamora WPScan
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.902Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "exploit",
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ninjaforms.com/blog/saturday-drive-x-edition/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://wordpress.org/plugins",
          "defaultStatus": "unaffected",
          "product": "Ninja Forms Contact Form",
          "vendor": "Unknown",
          "versions": [
            {
              "lessThan": "3.6.34",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Jonathan Zamora"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "WPScan"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-79 Cross-Site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-06T20:41:40.862Z",
        "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
        "shortName": "WPScan"
      },
      "references": [
        {
          "tags": [
            "exploit",
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae"
        },
        {
          "url": "https://ninjaforms.com/blog/saturday-drive-x-edition/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Ninja Forms \u003c 3.6.34 - Admin+ Stored XSS",
      "x_generator": {
        "engine": "WPScan CVE Generator"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
    "assignerShortName": "WPScan",
    "cveId": "CVE-2023-5530",
    "datePublished": "2023-11-06T20:41:40.862Z",
    "dateReserved": "2023-10-11T17:01:33.156Z",
    "dateUpdated": "2024-08-02T07:59:44.902Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*\", \"versionEndExcluding\": \"3.6.34\", \"matchCriteriaId\": \"8AE6BEE5-6ED8-4133-A08C-041F9B35FA9C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue\"}, {\"lang\": \"es\", \"value\": \"El complemento Ninja Forms Contact Form para WordPress anterior a 3.6.34 no sanitiza ni escapa de sus campos de etiqueta, lo que podr\\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques XSS almacenados. Solo los usuarios con la capacidad unfiltered_html pueden realizar esto, y dichos usuarios ya pueden usar JS en publicaciones/comentarios, etc. Sin embargo, el proveedor reconoci\\u00f3 y solucion\\u00f3 el problema.\"}]",
      "id": "CVE-2023-5530",
      "lastModified": "2024-11-21T08:41:56.960",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.7, \"impactScore\": 2.7}]}",
      "published": "2023-11-06T21:15:10.003",
      "references": "[{\"url\": \"https://ninjaforms.com/blog/saturday-drive-x-edition/\", \"source\": \"contact@wpscan.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae\", \"source\": \"contact@wpscan.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://ninjaforms.com/blog/saturday-drive-x-edition/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "contact@wpscan.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-5530\",\"sourceIdentifier\":\"contact@wpscan.com\",\"published\":\"2023-11-06T21:15:10.003\",\"lastModified\":\"2024-11-21T08:41:56.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue\"},{\"lang\":\"es\",\"value\":\"El complemento Ninja Forms Contact Form para WordPress anterior a 3.6.34 no sanitiza ni escapa de sus campos de etiqueta, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques XSS almacenados. Solo los usuarios con la capacidad unfiltered_html pueden realizar esto, y dichos usuarios ya pueden usar JS en publicaciones/comentarios, etc. Sin embargo, el proveedor reconoci\u00f3 y solucion\u00f3 el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.7,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*\",\"versionEndExcluding\":\"3.6.34\",\"matchCriteriaId\":\"8AE6BEE5-6ED8-4133-A08C-041F9B35FA9C\"}]}]}],\"references\":[{\"url\":\"https://ninjaforms.com/blog/saturday-drive-x-edition/\",\"source\":\"contact@wpscan.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae\",\"source\":\"contact@wpscan.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://ninjaforms.com/blog/saturday-drive-x-edition/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…