CVE-2023-3501: CWE-79 Cross-Site Scripting (XSS) in Unknown FormCraft
The FormCraft WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2023-3501 is a stored Cross-Site Scripting (XSS) vulnerability identified in the FormCraft WordPress plugin versions prior to 1.2.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts into the plugin's stored data. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is a common security restriction especially in multisite WordPress environments. The attack vector requires the attacker to have high privileges (admin-level) and some user interaction (e.g., saving or modifying settings). When exploited, the malicious script is stored persistently and executed in the context of other users who view the affected content, potentially leading to session hijacking, privilege escalation, or other malicious actions. The CVSS 3.1 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. There are no known exploits in the wild at the time of reporting, and no official patches or vendor information are currently available. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using WordPress sites with the FormCraft plugin, this vulnerability poses a moderate risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized script execution within the administrative interface or other areas where the malicious payload is rendered. This can result in theft of authentication tokens, unauthorized actions performed on behalf of administrators, or defacement of websites. In multisite WordPress setups, which are common in large organizations and educational institutions across Europe, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. While the vulnerability does not directly impact availability, the compromise of administrative accounts or site integrity can lead to operational disruptions, reputational damage, and potential data breaches. Given the medium severity and the requirement for high privileges, the threat is more significant in environments where multiple administrators manage WordPress sites or where privilege management is lax. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in sectors with high-value web assets such as finance, government, and media in Europe.
Mitigation Recommendations
Immediately update the FormCraft plugin to version 1.2.7 or later once available to ensure the vulnerability is patched. In the interim, restrict administrative access to trusted personnel only and audit existing admin accounts for suspicious activity. Implement strict input validation and sanitization on all plugin settings fields via custom security controls or web application firewalls (WAF) that can detect and block XSS payloads targeting FormCraft. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the WordPress admin interface. Regularly monitor WordPress logs and plugin settings for unusual changes or injected scripts. Educate administrators about the risks of stored XSS and encourage cautious handling of plugin settings and user inputs. Consider isolating multisite environments or applying additional privilege separation to reduce the impact of compromised admin accounts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-3501: CWE-79 Cross-Site Scripting (XSS) in Unknown FormCraft
Description
The FormCraft WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2023-3501 is a stored Cross-Site Scripting (XSS) vulnerability identified in the FormCraft WordPress plugin versions prior to 1.2.7. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts into the plugin's stored data. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is a common security restriction especially in multisite WordPress environments. The attack vector requires the attacker to have high privileges (admin-level) and some user interaction (e.g., saving or modifying settings). When exploited, the malicious script is stored persistently and executed in the context of other users who view the affected content, potentially leading to session hijacking, privilege escalation, or other malicious actions. The CVSS 3.1 base score is 4.8 (medium severity), reflecting the network attack vector, low attack complexity, high privileges required, and user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. There are no known exploits in the wild at the time of reporting, and no official patches or vendor information are currently available. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using WordPress sites with the FormCraft plugin, this vulnerability poses a moderate risk primarily to site administrators and users with elevated privileges. Exploitation could lead to unauthorized script execution within the administrative interface or other areas where the malicious payload is rendered. This can result in theft of authentication tokens, unauthorized actions performed on behalf of administrators, or defacement of websites. In multisite WordPress setups, which are common in large organizations and educational institutions across Europe, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. While the vulnerability does not directly impact availability, the compromise of administrative accounts or site integrity can lead to operational disruptions, reputational damage, and potential data breaches. Given the medium severity and the requirement for high privileges, the threat is more significant in environments where multiple administrators manage WordPress sites or where privilege management is lax. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in sectors with high-value web assets such as finance, government, and media in Europe.
Mitigation Recommendations
Immediately update the FormCraft plugin to version 1.2.7 or later once available to ensure the vulnerability is patched. In the interim, restrict administrative access to trusted personnel only and audit existing admin accounts for suspicious activity. Implement strict input validation and sanitization on all plugin settings fields via custom security controls or web application firewalls (WAF) that can detect and block XSS payloads targeting FormCraft. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the WordPress admin interface. Regularly monitor WordPress logs and plugin settings for unusual changes or injected scripts. Educate administrators about the risks of stored XSS and encourage cautious handling of plugin settings and user inputs. Consider isolating multisite environments or applying additional privilege separation to reduce the impact of compromised admin accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-07-04T10:24:36.537Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf5128
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 10:21:04 AM
Last updated: 10/15/2025, 6:24:53 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-26861: Uncontrolled Search Path Element in RSUPPORT CO., LTD. RemoteCall Remote Support Program (for Operator)
HighCVE-2025-26860: Uncontrolled Search Path Element in RSUPPORT CO., LTD. RemoteCall Remote Support Program (for Operator)
HighCVE-2025-26859: Uncontrolled Search Path Element in RSUPPORT CO., LTD. RemoteView PC Application Console
HighCVE-2025-10406: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BlindMatrix e-Commerce
HighCVE-2025-31702: CWE-732 Incorrect Permission Assignment for Critical Resource in Dahua IPC
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.