The Contact Form by BestWebSoft plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘cntctfrm_contact_subject’ parameter in all versions up to, and including, 4.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Mon, 07 Apr 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Bestwebsoft
Bestwebsoft contact Form
CPEs cpe:2.3:a:bestwebsoft:contact_form:*:*:*:*:*:wordpress:*:*
Vendors & Products Bestwebsoft
Bestwebsoft contact Form

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-26T18:35:38.860Z

Reserved: 2024-03-05T19:09:41.491Z

Link: CVE-2024-2200

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.383Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-09T19:15:29.960

Modified: 2025-04-07T13:28:48.983

Link: CVE-2024-2200

cve-icon Redhat

No data.