Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Saturday Drive Ninja Forms Contact Form plugin <= 3.6.25 versions.
Max Base Score
7.1
Published
2023-07-27
Updated
2023-08-04
EPSS
0.10%
The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue
Max Base Score
4.8
Published
2023-11-06
Updated
2023-11-14
EPSS
0.05%
The Ninja Forms Contact Form WordPress plugin before 3.6.22 does not properly escape user input before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Max Base Score
6.1
Published
2023-05-15
Updated
2023-05-23
EPSS
0.07%
The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
Max Base Score
7.2
Published
2022-09-26
Updated
2022-09-28
EPSS
0.09%
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Saturday Drive's Ninja Forms Contact Form plugin <= 3.6.9 at WordPress via "label".
Max Base Score
4.8
Published
2022-06-16
Updated
2023-04-04
EPSS
0.05%
The Ninja Forms WordPress plugin is vulnerable to arbitrary email sending via the trigger_email_action function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to send arbitrary emails from the affected server via the /ninja-forms-submissions/email-action REST API which can be used to socially engineer victims.
Max Base Score
6.4
Published
2021-09-22
Updated
2022-10-27
EPSS
0.05%
The Ninja Forms WordPress plugin is vulnerable to sensitive information disclosure via the bulk_export_submissions function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to export all Ninja Forms submissions data via the /ninja-forms-submissions/export REST API which can include personally identifiable information.
Max Base Score
6.5
Published
2021-09-22
Updated
2022-10-27
EPSS
0.07%
The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitize and escape some imported data, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Max Base Score
4.8
Published
2022-07-04
Updated
2022-07-12
EPSS
0.06%
The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitise and escape field labels, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Max Base Score
4.8
Published
2022-07-04
Updated
2022-07-13
EPSS
0.06%
The Ninja Forms Contact Form WordPress plugin before 3.6.4 does not escape keys of the fields POST parameter, which could allow high privilege users to perform SQL injections attacks
Max Base Score
7.2
Published
2021-11-29
Updated
2021-11-29
EPSS
0.09%
The wp_ajax_nf_oauth_disconnect from the Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 had no nonce protection making it possible for attackers to craft a request to disconnect a site's OAuth connection.
Max Base Score
5.8
Published
2021-04-05
Updated
2021-04-09
EPSS
0.09%
In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place.
Max Base Score
6.1
Published
2021-04-05
Updated
2021-04-09
EPSS
0.12%
In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.
Max Base Score
4.3
Published
2021-04-05
Updated
2022-08-30
EPSS
0.05%
The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin.
Max Base Score
8.8
Published
2021-04-05
Updated
2022-08-30
EPSS
0.10%
The Ninja Forms plugin before 3.4.27.1 for WordPress allows attackers to bypass validation via the email field.
Max Base Score
5.3
Published
2021-01-06
Updated
2021-07-21
EPSS
0.08%
The Ninja Forms plugin before 3.4.27.1 for WordPress allows CSRF via services integration.
Max Base Score
6.5
Published
2021-01-06
Updated
2021-01-08
EPSS
0.05%
The Ninja Forms plugin before 3.4.28 for WordPress lacks escaping for submissions-table fields.
Max Base Score
5.3
Published
2021-01-06
Updated
2021-07-21
EPSS
0.08%
The ninja-forms plugin before 3.4.24.2 for WordPress allows CSRF with resultant XSS.
Max Base Score
6.1
Published
2020-04-29
Updated
2020-05-06
EPSS
0.05%
The Ninja Forms plugin 3.4.22 for WordPress has Multiple Stored XSS vulnerabilities via ninja_forms[recaptcha_site_key], ninja_forms[recaptcha_secret_key], ninja_forms[recaptcha_lang], or ninja_forms[date_format].
Max Base Score
5.4
Published
2020-02-14
Updated
2020-02-18
EPSS
0.06%
The ninja-forms plugin before 3.3.9 for WordPress has insufficient restrictions on submission-data retrieval during Export Personal Data requests.
Max Base Score
9.1
Published
2019-08-22
Updated
2019-08-26
EPSS
0.17%
The ninja-forms plugin before 3.2.15 for WordPress has parameter tampering.
Max Base Score
7.5
Published
2019-08-22
Updated
2019-08-26
EPSS
0.08%
An open redirect in the Ninja Forms plugin before 3.3.19.1 for WordPress allows Remote Attackers to redirect a user via the lib/StepProcessing/step-processing.php (aka submissions download page) redirect parameter.
Max Base Score
6.1
Published
2018-12-03
Updated
2020-03-03
EPSS
0.23%
The Ninja Forms plugin before 3.3.14.1 for WordPress allows CSV injection.
Max Base Score
8.6
Published
2018-09-01
Updated
2020-08-24
EPSS
0.22%
The Ninja Forms plugin before 3.2.14 for WordPress has XSS.
Max Base Score
6.1
Published
2018-02-21
Updated
2018-03-05
EPSS
0.08%
The ninja-forms plugin before 3.0.31 for WordPress has insufficient HTML escaping in the builder.
Max Base Score
6.1
Published
2019-08-22
Updated
2019-08-26
EPSS
0.08%
28 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!