Vulnerabilities and security researches forsimple-basic-contact-form simple-basic-contact-form
Direction: ascendingJun 07, 2024
Simple Basic Contact Form # CVE-2022-4226
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 26, 2022
- Research Description
- The Simple Basic Contact Form WordPress plugin before 20221201 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Basic Contact Form # CVE-2024-4150
- CVE, Research URL
- Home page URL
- Application
- Date
- May 14, 2024
- Research Description
- The Simple Basic Contact Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘scf_email’ parameter in versions up to, and including, 20221201 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Basic Contact Form # CVE-2024-4144
- CVE, Research URL
- Home page URL
- Application
- Date
- May 14, 2024
- Research Description
- The Simple Basic Contact Form plugin for WordPress for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 20240502. This allows unauthenticated attackers to execute arbitrary shortcodes. The severity and exploitability depends on the functionality of other plugins installed in the environment.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
May 17, 2025
Simple Basic Contact Form # CVE-2024-12716
- CVE, Research URL
- Home page URL
- Application
- Date
- May 16, 2025
- Research Description
- The Simple Basic Contact Form WordPress plugin before 20250114 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
Min -, max -.
- Status
-
vulnerable