Vulnerabilities and security researches forlead-form-builder lead-form-builder
Direction: ascendingJun 07, 2024
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2022-23180
- CVE, Research URL
- Date
- Jan 16, 2024
- Research Description
- The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.7.4 doesn't have authorisation and nonce checks, which could allow any authenticated users, such as subscriber to update and change various settings
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2022-23179
- CVE, Research URL
- Date
- Jan 16, 2024
- Research Description
- The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.7.0 does not escape some of its form fields before outputting them in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2024-3637
- CVE, Research URL
- Date
- May 03, 2024
- Research Description
- The Responsive Contact Form Builder & Lead Generation Plugin WordPress plugin through 1.8.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2024-1416
- CVE, Research URL
- Date
- May 02, 2024
- Research Description
- The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPress is vulnerable to unauthorized access to functionality due to a missing capability check on several functions in all versions up to, and including, 1.8.9. This makes it possible for unauthenticated attackers to invoke those functions.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2024-1415
- CVE, Research URL
- Date
- May 02, 2024
- Research Description
- The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.9. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to invoke those functions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. These actions may result in form deletion, and lead signup as well as file upload.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2024-4261
- CVE, Research URL
- Date
- May 22, 2024
- Research Description
- The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.9.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with subscriber-level access and above, to execute arbitrary shortcodes.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2021-24967
- CVE, Research URL
- Date
- Dec 27, 2021
- Research Description
- The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.6.4 does not sanitise and escape some lead values, which could allow unauthenticated users to perform Cross-Site Scripting attacks against logged in admin viewing the inserted Leads
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
May 17, 2025
Responsive Contact Form Builder & Lead Generation Plugin # CVE-2024-10475
- CVE, Research URL
- Date
- May 16, 2025
- Research Description
- The Responsive Contact Form Builder & Lead Generation Plugin WordPress plugin before 1.9.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
Min -, max -.
- Status
-
vulnerable