Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2024-1640

Disclosure Date: March 13, 2024 (last updated April 01, 2024)
The Contact Form Builder Plugin: Multi Step Contact Form, Payment Form, Custom Contact Form Plugin by Bit Form plugin for WordPress is vulnerable to unauthorized modification of data due to a insufficient user validation on the bitforms_update_form_entry AJAX action in all versions up to, and including, 2.10.1. This makes it possible for unauthenticated attackers to modify form submissions.
0
Attacker Value
Unknown

CVE-2024-25905

Disclosure Date: February 21, 2024 (last updated February 21, 2024)
Cross-Site Request Forgery (CSRF) vulnerability in Mondula GmbH Multi Step Form.This issue affects Multi Step Form: from n/a through 1.7.18.
0
Attacker Value
Unknown

CVE-2023-50832

Disclosure Date: December 21, 2023 (last updated December 30, 2023)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mondula GmbH Multi Step Form allows Stored XSS.This issue affects Multi Step Form: from n/a through 1.7.13.
Attacker Value
Unknown

CVE-2023-47758

Disclosure Date: November 22, 2023 (last updated February 25, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Mondula GmbH Multi Step Form plugin <= 1.7.11 versions.
Attacker Value
Unknown

CVE-2022-4196

Disclosure Date: January 09, 2023 (last updated October 08, 2023)
The Multi Step Form WordPress plugin before 1.7.8 does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Attacker Value
Unknown

CVE-2018-14846

Disclosure Date: December 20, 2018 (last updated November 27, 2024)
The Mondula Multi Step Form plugin before 1.2.8 for WordPress has multiple stored XSS via wp-admin/admin-ajax.php.
0
Attacker Value
Unknown

CVE-2018-14430

Disclosure Date: July 25, 2018 (last updated November 27, 2024)
The Mondula Multi Step Form plugin through 1.2.5 for WordPress allows XSS via the fw_data [id][1], fw_data [id][2], fw_data [id][3], fw_data [id][4], or email field of the contact form, exploitable with an fw_send_email action to wp-admin/admin-ajax.php.
0