Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9528: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in techjewel Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder

0
Medium
VulnerabilityCVE-2024-9528cvecve-2024-9528cwe-79
Published: Sat Oct 05 2024 (10/05/2024, 02:34:50 UTC)
Source: CVE Database V5
Vendor/Project: techjewel
Product: Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder

Description

CVE-2024-9528 is a stored Cross-Site Scripting (XSS) vulnerability in the Contact Form Plugin by Fluent Forms for WordPress, affecting all versions up to 5. 1. 19. The flaw arises from insufficient input sanitization and output escaping in form label fields, allowing authenticated users with form editing privileges (typically administrators) to inject malicious scripts. These scripts execute whenever any user views the affected page, potentially leading to session hijacking, defacement, or other client-side attacks. The vulnerability has a CVSS score of 4. 9 (medium severity) and does not require user interaction but does require low privileges and network access. No known exploits are currently observed in the wild. Organizations using this plugin should promptly update or apply mitigations to prevent exploitation, especially since WordPress sites are common targets for web-based attacks.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:24:53 UTC

Technical Analysis

CVE-2024-9528 is a stored Cross-Site Scripting vulnerability identified in the Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder, a popular WordPress plugin developed by techjewel. The vulnerability affects all versions up to and including 5.1.19. It stems from improper neutralization of input during web page generation (CWE-79), specifically in the form label fields where user-supplied input is not properly sanitized or escaped before being rendered on pages. This allows an authenticated attacker with the ability to edit forms—typically an administrator—to inject arbitrary JavaScript code into form labels. When any user visits a page containing the injected form, the malicious script executes in their browser context. This can lead to theft of session cookies, redirection to malicious sites, or other client-side attacks. The vulnerability requires low privileges (authenticated user with form editing rights) and no user interaction to trigger once the malicious payload is stored. The CVSS v3.1 base score is 4.9, reflecting medium severity due to the limited scope of affected users (authenticated admins) and the complexity of exploitation (requires form editing access). No public exploits have been reported yet. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in plugins widely used on WordPress sites.

Potential Impact

The primary impact of CVE-2024-9528 is the potential for stored XSS attacks on WordPress sites using the vulnerable Fluent Forms plugin. Successful exploitation allows attackers to execute arbitrary JavaScript in the browsers of site visitors, which can lead to session hijacking, defacement, phishing, or distribution of malware. Since exploitation requires authenticated access with form editing privileges, the risk is somewhat mitigated by the need for an attacker to have or compromise admin-level credentials. However, many WordPress sites have multiple administrators or editors, increasing the attack surface. The vulnerability could be leveraged in multi-stage attacks where an attacker first gains low-level access and then escalates privileges to inject malicious scripts. For organizations, this can result in reputational damage, data leakage, and loss of user trust. Given the widespread use of WordPress and the popularity of the Fluent Forms plugin, a large number of websites could be affected globally, especially those that do not regularly update plugins or enforce strict access controls.

Mitigation Recommendations

To mitigate CVE-2024-9528, organizations should immediately update the Fluent Forms plugin to a version where this vulnerability is patched once available. Until an official patch is released, administrators should restrict form editing privileges to the minimum necessary users and audit existing forms for suspicious or unexpected script content in label fields. Implementing Web Application Firewalls (WAFs) with rules to detect and block common XSS payloads targeting form label inputs can provide temporary protection. Additionally, site administrators should enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Regular security audits and monitoring for unusual admin activity can help detect exploitation attempts. Developers and site owners should also consider applying custom input validation and output encoding on form fields if feasible. Finally, educating administrators about the risks of XSS and safe plugin management practices is essential.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-04T14:32:56.323Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b4fb7ef31ef0b55160f

Added to database: 2/25/2026, 9:36:15 PM

Last enriched: 2/25/2026, 11:24:53 PM

Last updated: 2/26/2026, 8:39:51 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats