Skip to main content

CVE-2023-3501: CWE-79 Cross-Site Scripting (XSS) in Unknown FormCraft

Medium
Published: Wed Aug 30 2023 (08/30/2023, 14:22:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: FormCraft

Description

The FormCraft WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 06/22/2025, 10:21:04 UTC

Technical Analysis

CVE-2023-3501 is a stored Cross-Site Scripting (XSS) vulnerability identified in the FormCraft WordPress plugin versions prior to 1.2.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts into the plugin's stored data. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is a common security restriction especially in multisite WordPress environments. The attack vector requires the attacker to have high privileges (admin-level) and some user interaction (e.g., saving or modifying settings). When exploited, the malicious script is stored persistently and executed in the context of other users who view the affected content, potentially leading to session hijacking, privilege escalation, or other malicious actions. The CVSS 3.1 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. There are no known exploits in the wild at the time of reporting, and no official patches or vendor information are currently available. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).

Potential Impact

For European organizations using WordPress sites with the FormCraft plugin, this vulnerability poses a moderate risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized script execution within the administrative interface or other areas where the malicious payload is rendered. This can result in theft of authentication tokens, unauthorized actions performed on behalf of administrators, or defacement of websites. In multisite WordPress setups, which are common in large organizations and educational institutions across Europe, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. While the vulnerability does not directly impact availability, the compromise of administrative accounts or site integrity can lead to operational disruptions, reputational damage, and potential data breaches. Given the medium severity and the requirement for high privileges, the threat is more significant in environments where multiple administrators manage WordPress sites or where privilege management is lax. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in sectors with high-value web assets such as finance, government, and media in Europe.

Mitigation Recommendations

Immediately update the FormCraft plugin to version 1.2.7 or later once available to ensure the vulnerability is patched. In the interim, restrict administrative access to trusted personnel only and audit existing admin accounts for suspicious activity. Implement strict input validation and sanitization on all plugin settings fields via custom security controls or web application firewalls (WAF) that can detect and block XSS payloads targeting FormCraft. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the WordPress admin interface. Regularly monitor WordPress logs and plugin settings for unusual changes or injected scripts. Educate administrators about the risks of stored XSS and encourage cautious handling of plugin settings and user inputs. Consider isolating multisite environments or applying additional privilege separation to reduce the impact of compromised admin accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-07-04T10:24:36.537Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf5128

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 10:21:04 AM

Last updated: 8/11/2025, 11:15:05 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats