CVE-2023-3501: CWE-79 Cross-Site Scripting (XSS) in Unknown FormCraft
The FormCraft WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2023-3501 is a stored Cross-Site Scripting (XSS) vulnerability identified in the FormCraft WordPress plugin versions prior to 1.2.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts into the plugin's stored data. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is a common security restriction especially in multisite WordPress environments. The attack vector requires the attacker to have high privileges (admin-level) and some user interaction (e.g., saving or modifying settings). When exploited, the malicious script is stored persistently and executed in the context of other users who view the affected content, potentially leading to session hijacking, privilege escalation, or other malicious actions. The CVSS 3.1 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. There are no known exploits in the wild at the time of reporting, and no official patches or vendor information are currently available. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using WordPress sites with the FormCraft plugin, this vulnerability poses a moderate risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized script execution within the administrative interface or other areas where the malicious payload is rendered. This can result in theft of authentication tokens, unauthorized actions performed on behalf of administrators, or defacement of websites. In multisite WordPress setups, which are common in large organizations and educational institutions across Europe, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. While the vulnerability does not directly impact availability, the compromise of administrative accounts or site integrity can lead to operational disruptions, reputational damage, and potential data breaches. Given the medium severity and the requirement for high privileges, the threat is more significant in environments where multiple administrators manage WordPress sites or where privilege management is lax. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in sectors with high-value web assets such as finance, government, and media in Europe.
Mitigation Recommendations
Immediately update the FormCraft plugin to version 1.2.7 or later once available to ensure the vulnerability is patched. In the interim, restrict administrative access to trusted personnel only and audit existing admin accounts for suspicious activity. Implement strict input validation and sanitization on all plugin settings fields via custom security controls or web application firewalls (WAF) that can detect and block XSS payloads targeting FormCraft. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the WordPress admin interface. Regularly monitor WordPress logs and plugin settings for unusual changes or injected scripts. Educate administrators about the risks of stored XSS and encourage cautious handling of plugin settings and user inputs. Consider isolating multisite environments or applying additional privilege separation to reduce the impact of compromised admin accounts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-3501: CWE-79 Cross-Site Scripting (XSS) in Unknown FormCraft
Description
The FormCraft WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2023-3501 is a stored Cross-Site Scripting (XSS) vulnerability identified in the FormCraft WordPress plugin versions prior to 1.2.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts into the plugin's stored data. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is a common security restriction especially in multisite WordPress environments. The attack vector requires the attacker to have high privileges (admin-level) and some user interaction (e.g., saving or modifying settings). When exploited, the malicious script is stored persistently and executed in the context of other users who view the affected content, potentially leading to session hijacking, privilege escalation, or other malicious actions. The CVSS 3.1 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. There are no known exploits in the wild at the time of reporting, and no official patches or vendor information are currently available. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using WordPress sites with the FormCraft plugin, this vulnerability poses a moderate risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized script execution within the administrative interface or other areas where the malicious payload is rendered. This can result in theft of authentication tokens, unauthorized actions performed on behalf of administrators, or defacement of websites. In multisite WordPress setups, which are common in large organizations and educational institutions across Europe, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. While the vulnerability does not directly impact availability, the compromise of administrative accounts or site integrity can lead to operational disruptions, reputational damage, and potential data breaches. Given the medium severity and the requirement for high privileges, the threat is more significant in environments where multiple administrators manage WordPress sites or where privilege management is lax. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in sectors with high-value web assets such as finance, government, and media in Europe.
Mitigation Recommendations
Immediately update the FormCraft plugin to version 1.2.7 or later once available to ensure the vulnerability is patched. In the interim, restrict administrative access to trusted personnel only and audit existing admin accounts for suspicious activity. Implement strict input validation and sanitization on all plugin settings fields via custom security controls or web application firewalls (WAF) that can detect and block XSS payloads targeting FormCraft. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the WordPress admin interface. Regularly monitor WordPress logs and plugin settings for unusual changes or injected scripts. Educate administrators about the risks of stored XSS and encourage cautious handling of plugin settings and user inputs. Consider isolating multisite environments or applying additional privilege separation to reduce the impact of compromised admin accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-07-04T10:24:36.537Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf5128
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 10:21:04 AM
Last updated: 8/11/2025, 11:15:05 AM
Views: 17
Related Threats
CVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.