Skip to main content

CVE-2025-48245: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in fullworks Quick Contact Form

High
VulnerabilityCVE-2025-48245cvecve-2025-48245cwe-79
Published: Fri May 23 2025 (05/23/2025, 12:43:17 UTC)
Source: CVE
Vendor/Project: fullworks
Product: Quick Contact Form

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fullworks Quick Contact Form allows Reflected XSS. This issue affects Quick Contact Form : from n/a through 8.2.1.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:12:53 UTC

Technical Analysis

CVE-2025-48245 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability identified in the fullworks Quick Contact Form plugin, affecting versions up to 8.2.1. This vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. Specifically, the plugin fails to adequately sanitize or encode input parameters that are reflected back in the HTTP response, allowing an attacker to inject malicious scripts. When a victim user clicks on a crafted URL containing malicious payloads, the injected script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, unauthorized actions on behalf of the user, or redirection to malicious sites. The CVSS v3.1 base score is 7.1, reflecting a high severity with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L, indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and partial impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects the Quick Contact Form plugin, which is commonly used on websites to provide a simple contact interface, often integrated into CMS platforms such as WordPress. The reflected XSS nature means that the attack requires a victim to interact with a maliciously crafted link, but the impact can be significant due to the potential for session hijacking and data theft. The scope change in CVSS indicates that exploitation can affect resources beyond the vulnerable component, potentially impacting the entire web application or user session.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for businesses relying on the fullworks Quick Contact Form plugin on their public-facing websites. Successful exploitation can lead to unauthorized access to user sessions, theft of sensitive customer data, and reputational damage. Given the GDPR regulations in Europe, any compromise of personal data could result in substantial fines and legal consequences. Additionally, the reflected XSS can be used as a vector for phishing attacks targeting European users, leveraging localized language and trust in the affected websites. Organizations in sectors such as e-commerce, finance, healthcare, and government services are particularly at risk due to the sensitive nature of their data and the criticality of maintaining user trust. The vulnerability's ability to impact confidentiality, integrity, and availability means that it could disrupt normal business operations and erode customer confidence. Furthermore, the scope change suggests that the impact could extend beyond the plugin itself, potentially affecting other integrated systems or services within the web application environment.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate assessment of all web properties using the fullworks Quick Contact Form plugin to identify affected versions. 2) Apply any available patches or updates from the vendor as soon as they are released. In the absence of official patches, implement input validation and output encoding at the application level to neutralize potentially malicious input. 3) Employ Web Application Firewalls (WAFs) configured with rules to detect and block reflected XSS attack patterns targeting the Quick Contact Form endpoints. 4) Conduct security awareness training for users to recognize and avoid clicking on suspicious links that could exploit reflected XSS vulnerabilities. 5) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 6) Regularly scan web applications using automated tools to detect XSS vulnerabilities and verify remediation effectiveness. 7) Monitor web server logs and intrusion detection systems for unusual request patterns indicative of exploitation attempts. These measures, combined with a robust incident response plan, will reduce the risk and potential impact of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-19T14:13:02.790Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a249272477

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 8:12:53 PM

Last updated: 8/17/2025, 10:02:48 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats