Skip to main content

CVE-2023-5005: CWE-79 Cross-Site Scripting (XSS) in Unknown Autocomplete Location field Contact Form 7

Medium
VulnerabilityCVE-2023-5005cvecve-2023-5005cwe-79
Published: Mon Dec 18 2023 (12/18/2023, 20:07:55 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Autocomplete Location field Contact Form 7

Description

The Autocomplete Location field Contact Form 7 WordPress plugin before 3.0, autocomplete-location-field-contact-form-7-pro WordPress plugin before 2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/05/2025, 08:57:01 UTC

Technical Analysis

CVE-2023-5005 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Autocomplete Location field Contact Form 7 WordPress plugin versions prior to 3.0, and the autocomplete-location-field-contact-form-7-pro plugin versions prior to 2.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings related to the autocomplete location field. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The attack vector requires high privilege (admin) and user interaction, as the attacker must have access to the plugin settings to inject the payload. Exploitation could lead to execution of arbitrary JavaScript in the context of the affected site, potentially enabling theft of cookies, session tokens, or performing actions on behalf of other users. The CVSS 3.1 base score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. There are no known exploits in the wild at this time, and no patches are linked in the provided data, indicating that users should verify plugin updates or apply mitigations promptly. This vulnerability is categorized under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.

Potential Impact

For European organizations using WordPress sites with the vulnerable Autocomplete Location field Contact Form 7 plugin, this vulnerability poses a risk primarily to site integrity and confidentiality. If exploited, attackers with admin access could inject malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the site. This is particularly concerning for organizations with multisite WordPress deployments where unfiltered_html is disabled, as it may create a false sense of security. The impact is more significant for organizations relying on these plugins for customer interaction or data collection, as compromised sites can damage reputation and lead to data breaches. However, since exploitation requires admin privileges and user interaction, the risk is somewhat mitigated by internal access controls. Nonetheless, insider threats or compromised admin accounts could leverage this vulnerability. Given the widespread use of WordPress in Europe across sectors such as government, education, and commerce, the vulnerability could affect a broad range of organizations if the plugin is installed and not updated.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately verify if the Autocomplete Location field Contact Form 7 or its pro variant is installed and identify the plugin version. 2) Upgrade to the latest plugin versions (3.0 or higher for the free plugin, 2.0 or higher for the pro version) once available, as these should include proper sanitization and escaping fixes. 3) In the absence of an official patch, restrict admin access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of compromised admin accounts. 4) Conduct a thorough audit of plugin settings for any suspicious or unexpected script content and sanitize or reset these settings manually if needed. 5) Implement Content Security Policy (CSP) headers to limit the impact of any injected scripts by restricting sources of executable scripts. 6) Monitor WordPress logs and user activity for signs of unauthorized changes or suspicious behavior. 7) Educate administrators about the risks of stored XSS and safe plugin configuration practices. These targeted mitigations go beyond generic advice by focusing on access control, plugin version management, and proactive detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-09-15T20:36:30.114Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8c44

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:57:01 AM

Last updated: 8/16/2025, 2:38:44 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats