Search criteria
10 vulnerabilities found for contact_form_to_db by bestwebsoft
CVE-2024-35678 (GCVE-0-2024-35678)
Vulnerability from nvd – Published: 2024-06-08 15:57 – Updated: 2024-08-02 03:14
VLAI?
Title
WordPress Contact Form to DB by BestWebSoft plugin <= 1.7.2 - SQL Injection vulnerability
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.This issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2.
Severity ?
8.5 (High)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BestWebSoft | Contact Form to DB by BestWebSoft |
Affected:
n/a , ≤ 1.7.2
(custom)
|
Credits
Do Truong Giang (Patchstack Alliance)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:*"
],
"defaultStatus": "unaffected",
"product": "contact_form_to_db",
"vendor": "bestwebsoft",
"versions": [
{
"lessThanOrEqual": "1.7.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-35678",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-10T19:45:49.005964Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-10T19:46:34.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T03:14:53.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-2-sql-injection-vulnerability?_s_id=cve"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected",
"packageName": "contact-form-to-db",
"product": "Contact Form to DB by BestWebSoft",
"vendor": "BestWebSoft",
"versions": [
{
"changes": [
{
"at": "1.7.3",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.7.2",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Do Truong Giang (Patchstack Alliance)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.\u003cp\u003eThis issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2.\u003c/p\u003e"
}
],
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.This issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-08T15:57:32.999Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"vdb-entry"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-2-sql-injection-vulnerability?_s_id=cve"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 1.7.3 or a higher version."
}
],
"value": "Update to 1.7.3 or a higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Contact Form to DB by BestWebSoft plugin \u003c= 1.7.2 - SQL Injection vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2024-35678",
"datePublished": "2024-06-08T15:57:32.999Z",
"dateReserved": "2024-05-17T10:08:45.807Z",
"dateUpdated": "2024-08-02T03:14:53.787Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-29096 (GCVE-0-2023-29096)
Vulnerability from nvd – Published: 2023-12-20 17:16 – Updated: 2024-08-02 14:00
VLAI?
Title
WordPress Contact Form to DB by BestWebSoft Plugin <= 1.7.0 is vulnerable to SQL Injection
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress.This issue affects Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress: from n/a through 1.7.0.
Severity ?
8.5 (High)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BestWebSoft | Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress |
Affected:
n/a , ≤ 1.7.0
(custom)
|
Credits
easyBug (Patchstack Alliance)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:00:15.848Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-0-sql-injection-vulnerability?_s_id=cve"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected",
"packageName": "contact-form-to-db",
"product": "Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress",
"vendor": "BestWebSoft",
"versions": [
{
"changes": [
{
"at": "1.7.1",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.7.0",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "easyBug (Patchstack Alliance)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress.\u003cp\u003eThis issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.0.\u003c/p\u003e"
}
],
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress.This issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.0.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-20T17:16:06.155Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"vdb-entry"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-0-sql-injection-vulnerability?_s_id=cve"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Contact Form to DB by BestWebSoft Plugin \u003c= 1.7.0 is vulnerable to SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2023-29096",
"datePublished": "2023-12-20T17:16:06.155Z",
"dateReserved": "2023-03-31T07:39:14.639Z",
"dateUpdated": "2024-08-02T14:00:15.848Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-36508 (GCVE-0-2023-36508)
Vulnerability from nvd – Published: 2023-10-31 14:23 – Updated: 2025-02-19 21:24
VLAI?
Title
WordPress Contact Form to DB by BestWebSoft Plugin <= 1.7.1 is vulnerable to SQL Injection
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.This issue affects Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress: from n/a through 1.7.1.
Severity ?
9.8 (Critical)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BestWebSoft | Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress |
Affected:
n/a , ≤ 1.7.1
(custom)
|
Credits
LEE SE HYOUNG (Patchstack Alliance)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:45:57.051Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-1-sql-injection-vulnerability?_s_id=cve"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-36508",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-19T21:12:08.235885Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T21:24:38.348Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected",
"packageName": "contact-form-to-db",
"product": "Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress",
"vendor": "BestWebSoft",
"versions": [
{
"changes": [
{
"at": "1.7.2",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.7.1",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "LEE SE HYOUNG (Patchstack Alliance)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.\u003cp\u003eThis issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.1.\u003c/p\u003e"
}
],
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.This issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.1.\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-66",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-66 SQL Injection"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-31T14:23:21.313Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"vdb-entry"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-1-sql-injection-vulnerability?_s_id=cve"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to\u0026nbsp;1.7.2 or a higher version."
}
],
"value": "Update to\u00a01.7.2 or a higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Contact Form to DB by BestWebSoft Plugin \u003c= 1.7.1 is vulnerable to SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2023-36508",
"datePublished": "2023-10-31T14:23:21.313Z",
"dateReserved": "2023-06-22T08:38:41.922Z",
"dateUpdated": "2025-02-19T21:24:38.348Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-18492 (GCVE-0-2017-18492)
Vulnerability from nvd – Published: 2019-08-13 16:47 – Updated: 2024-08-05 21:20
VLAI?
Summary
The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T21:20:51.351Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://wordpress.org/plugins/contact-form-to-db/#developers"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-08-13T16:47:27",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://wordpress.org/plugins/contact-form-to-db/#developers"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18492",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/plugins/contact-form-to-db/#developers",
"refsource": "MISC",
"url": "https://wordpress.org/plugins/contact-form-to-db/#developers"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-18492",
"datePublished": "2019-08-13T16:47:27",
"dateReserved": "2019-08-12T00:00:00",
"dateUpdated": "2024-08-05T21:20:51.351Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-2171 (GCVE-0-2017-2171)
Vulnerability from nvd – Published: 2017-05-22 16:00 – Updated: 2024-08-05 13:48
VLAI?
Summary
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF & Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu.
Severity ?
No CVSS data available.
CWE
- Cross-site scripting
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| BestWebSoft | Captcha |
Affected:
prior to version 4.3.0
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T13:48:03.789Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2017-000094",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094"
},
{
"name": "JVN#24834813",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN24834813/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Captcha",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 4.3.0"
}
]
},
{
"product": "Car Rental",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Contact Form Multi",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.1"
}
]
},
{
"product": "Contact Form",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 4.0.6"
}
]
},
{
"product": "Contact Form to DB",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.5.7"
}
]
},
{
"product": "Custom Admin Page",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.1.2"
}
]
},
{
"product": "Custom Fields Search",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.2"
}
]
},
{
"product": "Custom Search",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.36"
}
]
},
{
"product": "Donate",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.1.1"
}
]
},
{
"product": "Email Queue",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.2"
}
]
},
{
"product": "Error Log Viewer",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.6"
}
]
},
{
"product": "Facebook Button",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.54"
}
]
},
{
"product": "Featured Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.1"
}
]
},
{
"product": "Gallery Categories",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.9"
}
]
},
{
"product": "Gallery",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 4.5.0"
}
]
},
{
"product": "Google +1",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.4"
}
]
},
{
"product": "Google AdSense",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.44"
}
]
},
{
"product": "Google Analytics",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.7.1"
}
]
},
{
"product": "Google Captcha (reCAPTCHA)",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.28"
}
]
},
{
"product": "Google Maps",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.6"
}
]
},
{
"product": "Google Shortlink",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.5.3"
}
]
},
{
"product": "Google Sitemap",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 3.0.8"
}
]
},
{
"product": "Htaccess",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.7.6"
}
]
},
{
"product": "Job Board",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.3"
}
]
},
{
"product": "Latest Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.3"
}
]
},
{
"product": "Limit Attempts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.8"
}
]
},
{
"product": "LinkedIn",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Multilanguage",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.2"
}
]
},
{
"product": "PDF \u0026 Print",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.9.4"
}
]
},
{
"product": "Pagination",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.7"
}
]
},
{
"product": "Pinterest",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Popular Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Portfolio",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.4"
}
]
},
{
"product": "Post to CSV",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.1"
}
]
},
{
"product": "Profile Extra",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.7"
}
]
},
{
"product": "PromoBar",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.1"
}
]
},
{
"product": "Quotes and Tips",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.32"
}
]
},
{
"product": "Re-attacher",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.9"
}
]
},
{
"product": "Realty",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.0"
}
]
},
{
"product": "Relevant - Related Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.0"
}
]
},
{
"product": "Sender",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.1"
}
]
},
{
"product": "SMTP",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.0"
}
]
},
{
"product": "Social Buttons Pack",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.1"
}
]
},
{
"product": "Subscriber",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.5"
}
]
},
{
"product": "Testimonials",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.1.9"
}
]
},
{
"product": "Timesheet",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.1.5"
}
]
},
{
"product": "Twitter Button",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.55"
}
]
},
{
"product": "User Role",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.5.6"
}
]
},
{
"product": "Updater",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.35"
}
]
},
{
"product": "Visitors Online",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.0"
}
]
},
{
"product": "Zendesk Help Center",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
}
],
"datePublic": "2017-05-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Cross-site scripting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-05-22T15:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2017-000094",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094"
},
{
"name": "JVN#24834813",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "https://jvn.jp/en/jp/JVN24834813/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2017-2171",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Captcha",
"version": {
"version_data": [
{
"version_value": "prior to version 4.3.0"
}
]
}
},
{
"product_name": "Car Rental",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Contact Form Multi",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.1"
}
]
}
},
{
"product_name": "Contact Form",
"version": {
"version_data": [
{
"version_value": "prior to version 4.0.6"
}
]
}
},
{
"product_name": "Contact Form to DB",
"version": {
"version_data": [
{
"version_value": "prior to version 1.5.7"
}
]
}
},
{
"product_name": "Custom Admin Page",
"version": {
"version_data": [
{
"version_value": "prior to version 0.1.2"
}
]
}
},
{
"product_name": "Custom Fields Search",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.2"
}
]
}
},
{
"product_name": "Custom Search",
"version": {
"version_data": [
{
"version_value": "prior to version 1.36"
}
]
}
},
{
"product_name": "Donate",
"version": {
"version_data": [
{
"version_value": "prior to version 2.1.1"
}
]
}
},
{
"product_name": "Email Queue",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.2"
}
]
}
},
{
"product_name": "Error Log Viewer",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.6"
}
]
}
},
{
"product_name": "Facebook Button",
"version": {
"version_data": [
{
"version_value": "prior to version 2.54"
}
]
}
},
{
"product_name": "Featured Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.1"
}
]
}
},
{
"product_name": "Gallery Categories",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.9"
}
]
}
},
{
"product_name": "Gallery",
"version": {
"version_data": [
{
"version_value": "prior to version 4.5.0"
}
]
}
},
{
"product_name": "Google +1",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.4"
}
]
}
},
{
"product_name": "Google AdSense",
"version": {
"version_data": [
{
"version_value": "prior to version 1.44"
}
]
}
},
{
"product_name": "Google Analytics",
"version": {
"version_data": [
{
"version_value": "prior to version 1.7.1"
}
]
}
},
{
"product_name": "Google Captcha (reCAPTCHA)",
"version": {
"version_data": [
{
"version_value": "prior to version 1.28"
}
]
}
},
{
"product_name": "Google Maps",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.6"
}
]
}
},
{
"product_name": "Google Shortlink",
"version": {
"version_data": [
{
"version_value": "prior to version 1.5.3"
}
]
}
},
{
"product_name": "Google Sitemap",
"version": {
"version_data": [
{
"version_value": "prior to version 3.0.8"
}
]
}
},
{
"product_name": "Htaccess",
"version": {
"version_data": [
{
"version_value": "prior to version 1.7.6"
}
]
}
},
{
"product_name": "Job Board",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.3"
}
]
}
},
{
"product_name": "Latest Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 0.3"
}
]
}
},
{
"product_name": "Limit Attempts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.8"
}
]
}
},
{
"product_name": "LinkedIn",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Multilanguage",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.2"
}
]
}
},
{
"product_name": "PDF \u0026 Print",
"version": {
"version_data": [
{
"version_value": "prior to version 1.9.4"
}
]
}
},
{
"product_name": "Pagination",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.7"
}
]
}
},
{
"product_name": "Pinterest",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Popular Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Portfolio",
"version": {
"version_data": [
{
"version_value": "prior to version 2.4"
}
]
}
},
{
"product_name": "Post to CSV",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.1"
}
]
}
},
{
"product_name": "Profile Extra",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.7"
}
]
}
},
{
"product_name": "PromoBar",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.1"
}
]
}
},
{
"product_name": "Quotes and Tips",
"version": {
"version_data": [
{
"version_value": "prior to version 1.32"
}
]
}
},
{
"product_name": "Re-attacher",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.9"
}
]
}
},
{
"product_name": "Realty",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.0"
}
]
}
},
{
"product_name": "Relevant - Related Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.0"
}
]
}
},
{
"product_name": "Sender",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.1"
}
]
}
},
{
"product_name": "SMTP",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.0"
}
]
}
},
{
"product_name": "Social Buttons Pack",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.1"
}
]
}
},
{
"product_name": "Subscriber",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.5"
}
]
}
},
{
"product_name": "Testimonials",
"version": {
"version_data": [
{
"version_value": "prior to version 0.1.9"
}
]
}
},
{
"product_name": "Timesheet",
"version": {
"version_data": [
{
"version_value": "prior to version 0.1.5"
}
]
}
},
{
"product_name": "Twitter Button",
"version": {
"version_data": [
{
"version_value": "prior to version 2.55"
}
]
}
},
{
"product_name": "User Role",
"version": {
"version_data": [
{
"version_value": "prior to version 1.5.6"
}
]
}
},
{
"product_name": "Updater",
"version": {
"version_data": [
{
"version_value": "prior to version 1.35"
}
]
}
},
{
"product_name": "Visitors Online",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.0"
}
]
}
},
{
"product_name": "Zendesk Help Center",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
}
]
},
"vendor_name": "BestWebSoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2017-000094",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094"
},
{
"name": "JVN#24834813",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN24834813/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2017-2171",
"datePublished": "2017-05-22T16:00:00",
"dateReserved": "2016-12-01T00:00:00",
"dateUpdated": "2024-08-05T13:48:03.789Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-35678 (GCVE-0-2024-35678)
Vulnerability from cvelistv5 – Published: 2024-06-08 15:57 – Updated: 2024-08-02 03:14
VLAI?
Title
WordPress Contact Form to DB by BestWebSoft plugin <= 1.7.2 - SQL Injection vulnerability
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.This issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2.
Severity ?
8.5 (High)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BestWebSoft | Contact Form to DB by BestWebSoft |
Affected:
n/a , ≤ 1.7.2
(custom)
|
Credits
Do Truong Giang (Patchstack Alliance)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:*"
],
"defaultStatus": "unaffected",
"product": "contact_form_to_db",
"vendor": "bestwebsoft",
"versions": [
{
"lessThanOrEqual": "1.7.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-35678",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-10T19:45:49.005964Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-10T19:46:34.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T03:14:53.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-2-sql-injection-vulnerability?_s_id=cve"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected",
"packageName": "contact-form-to-db",
"product": "Contact Form to DB by BestWebSoft",
"vendor": "BestWebSoft",
"versions": [
{
"changes": [
{
"at": "1.7.3",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.7.2",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Do Truong Giang (Patchstack Alliance)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.\u003cp\u003eThis issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2.\u003c/p\u003e"
}
],
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft.This issue affects Contact Form to DB by BestWebSoft: from n/a through 1.7.2."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-08T15:57:32.999Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"vdb-entry"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-2-sql-injection-vulnerability?_s_id=cve"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 1.7.3 or a higher version."
}
],
"value": "Update to 1.7.3 or a higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Contact Form to DB by BestWebSoft plugin \u003c= 1.7.2 - SQL Injection vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2024-35678",
"datePublished": "2024-06-08T15:57:32.999Z",
"dateReserved": "2024-05-17T10:08:45.807Z",
"dateUpdated": "2024-08-02T03:14:53.787Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-29096 (GCVE-0-2023-29096)
Vulnerability from cvelistv5 – Published: 2023-12-20 17:16 – Updated: 2024-08-02 14:00
VLAI?
Title
WordPress Contact Form to DB by BestWebSoft Plugin <= 1.7.0 is vulnerable to SQL Injection
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress.This issue affects Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress: from n/a through 1.7.0.
Severity ?
8.5 (High)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BestWebSoft | Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress |
Affected:
n/a , ≤ 1.7.0
(custom)
|
Credits
easyBug (Patchstack Alliance)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:00:15.848Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-0-sql-injection-vulnerability?_s_id=cve"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected",
"packageName": "contact-form-to-db",
"product": "Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress",
"vendor": "BestWebSoft",
"versions": [
{
"changes": [
{
"at": "1.7.1",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.7.0",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "easyBug (Patchstack Alliance)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress.\u003cp\u003eThis issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.0.\u003c/p\u003e"
}
],
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress.This issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.0.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-20T17:16:06.155Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"vdb-entry"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-0-sql-injection-vulnerability?_s_id=cve"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Contact Form to DB by BestWebSoft Plugin \u003c= 1.7.0 is vulnerable to SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2023-29096",
"datePublished": "2023-12-20T17:16:06.155Z",
"dateReserved": "2023-03-31T07:39:14.639Z",
"dateUpdated": "2024-08-02T14:00:15.848Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-36508 (GCVE-0-2023-36508)
Vulnerability from cvelistv5 – Published: 2023-10-31 14:23 – Updated: 2025-02-19 21:24
VLAI?
Title
WordPress Contact Form to DB by BestWebSoft Plugin <= 1.7.1 is vulnerable to SQL Injection
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.This issue affects Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress: from n/a through 1.7.1.
Severity ?
9.8 (Critical)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BestWebSoft | Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress |
Affected:
n/a , ≤ 1.7.1
(custom)
|
Credits
LEE SE HYOUNG (Patchstack Alliance)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:45:57.051Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-1-sql-injection-vulnerability?_s_id=cve"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-36508",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-19T21:12:08.235885Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T21:24:38.348Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected",
"packageName": "contact-form-to-db",
"product": "Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress",
"vendor": "BestWebSoft",
"versions": [
{
"changes": [
{
"at": "1.7.2",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.7.1",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "LEE SE HYOUNG (Patchstack Alliance)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.\u003cp\u003eThis issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.1.\u003c/p\u003e"
}
],
"value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress contact-form-to-db allows SQL Injection.This issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.1.\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-66",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-66 SQL Injection"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-31T14:23:21.313Z",
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"shortName": "Patchstack"
},
"references": [
{
"tags": [
"vdb-entry"
],
"url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-1-sql-injection-vulnerability?_s_id=cve"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to\u0026nbsp;1.7.2 or a higher version."
}
],
"value": "Update to\u00a01.7.2 or a higher version."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WordPress Contact Form to DB by BestWebSoft Plugin \u003c= 1.7.1 is vulnerable to SQL Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
"assignerShortName": "Patchstack",
"cveId": "CVE-2023-36508",
"datePublished": "2023-10-31T14:23:21.313Z",
"dateReserved": "2023-06-22T08:38:41.922Z",
"dateUpdated": "2025-02-19T21:24:38.348Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-18492 (GCVE-0-2017-18492)
Vulnerability from cvelistv5 – Published: 2019-08-13 16:47 – Updated: 2024-08-05 21:20
VLAI?
Summary
The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T21:20:51.351Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://wordpress.org/plugins/contact-form-to-db/#developers"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-08-13T16:47:27",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://wordpress.org/plugins/contact-form-to-db/#developers"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18492",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/plugins/contact-form-to-db/#developers",
"refsource": "MISC",
"url": "https://wordpress.org/plugins/contact-form-to-db/#developers"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-18492",
"datePublished": "2019-08-13T16:47:27",
"dateReserved": "2019-08-12T00:00:00",
"dateUpdated": "2024-08-05T21:20:51.351Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-2171 (GCVE-0-2017-2171)
Vulnerability from cvelistv5 – Published: 2017-05-22 16:00 – Updated: 2024-08-05 13:48
VLAI?
Summary
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF & Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu.
Severity ?
No CVSS data available.
CWE
- Cross-site scripting
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| BestWebSoft | Captcha |
Affected:
prior to version 4.3.0
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T13:48:03.789Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2017-000094",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094"
},
{
"name": "JVN#24834813",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN24834813/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Captcha",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 4.3.0"
}
]
},
{
"product": "Car Rental",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Contact Form Multi",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.1"
}
]
},
{
"product": "Contact Form",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 4.0.6"
}
]
},
{
"product": "Contact Form to DB",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.5.7"
}
]
},
{
"product": "Custom Admin Page",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.1.2"
}
]
},
{
"product": "Custom Fields Search",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.2"
}
]
},
{
"product": "Custom Search",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.36"
}
]
},
{
"product": "Donate",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.1.1"
}
]
},
{
"product": "Email Queue",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.2"
}
]
},
{
"product": "Error Log Viewer",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.6"
}
]
},
{
"product": "Facebook Button",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.54"
}
]
},
{
"product": "Featured Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.1"
}
]
},
{
"product": "Gallery Categories",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.9"
}
]
},
{
"product": "Gallery",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 4.5.0"
}
]
},
{
"product": "Google +1",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.4"
}
]
},
{
"product": "Google AdSense",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.44"
}
]
},
{
"product": "Google Analytics",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.7.1"
}
]
},
{
"product": "Google Captcha (reCAPTCHA)",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.28"
}
]
},
{
"product": "Google Maps",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.6"
}
]
},
{
"product": "Google Shortlink",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.5.3"
}
]
},
{
"product": "Google Sitemap",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 3.0.8"
}
]
},
{
"product": "Htaccess",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.7.6"
}
]
},
{
"product": "Job Board",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.3"
}
]
},
{
"product": "Latest Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.3"
}
]
},
{
"product": "Limit Attempts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.8"
}
]
},
{
"product": "LinkedIn",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Multilanguage",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.2"
}
]
},
{
"product": "PDF \u0026 Print",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.9.4"
}
]
},
{
"product": "Pagination",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.7"
}
]
},
{
"product": "Pinterest",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Popular Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
},
{
"product": "Portfolio",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.4"
}
]
},
{
"product": "Post to CSV",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.1"
}
]
},
{
"product": "Profile Extra",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.7"
}
]
},
{
"product": "PromoBar",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.1"
}
]
},
{
"product": "Quotes and Tips",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.32"
}
]
},
{
"product": "Re-attacher",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.9"
}
]
},
{
"product": "Realty",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.0"
}
]
},
{
"product": "Relevant - Related Posts",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.0"
}
]
},
{
"product": "Sender",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.2.1"
}
]
},
{
"product": "SMTP",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.0"
}
]
},
{
"product": "Social Buttons Pack",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.1.1"
}
]
},
{
"product": "Subscriber",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.3.5"
}
]
},
{
"product": "Testimonials",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.1.9"
}
]
},
{
"product": "Timesheet",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 0.1.5"
}
]
},
{
"product": "Twitter Button",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 2.55"
}
]
},
{
"product": "User Role",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.5.6"
}
]
},
{
"product": "Updater",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.35"
}
]
},
{
"product": "Visitors Online",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.0"
}
]
},
{
"product": "Zendesk Help Center",
"vendor": "BestWebSoft",
"versions": [
{
"status": "affected",
"version": "prior to version 1.0.5"
}
]
}
],
"datePublic": "2017-05-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Cross-site scripting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-05-22T15:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2017-000094",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094"
},
{
"name": "JVN#24834813",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "https://jvn.jp/en/jp/JVN24834813/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2017-2171",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Captcha",
"version": {
"version_data": [
{
"version_value": "prior to version 4.3.0"
}
]
}
},
{
"product_name": "Car Rental",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Contact Form Multi",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.1"
}
]
}
},
{
"product_name": "Contact Form",
"version": {
"version_data": [
{
"version_value": "prior to version 4.0.6"
}
]
}
},
{
"product_name": "Contact Form to DB",
"version": {
"version_data": [
{
"version_value": "prior to version 1.5.7"
}
]
}
},
{
"product_name": "Custom Admin Page",
"version": {
"version_data": [
{
"version_value": "prior to version 0.1.2"
}
]
}
},
{
"product_name": "Custom Fields Search",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.2"
}
]
}
},
{
"product_name": "Custom Search",
"version": {
"version_data": [
{
"version_value": "prior to version 1.36"
}
]
}
},
{
"product_name": "Donate",
"version": {
"version_data": [
{
"version_value": "prior to version 2.1.1"
}
]
}
},
{
"product_name": "Email Queue",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.2"
}
]
}
},
{
"product_name": "Error Log Viewer",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.6"
}
]
}
},
{
"product_name": "Facebook Button",
"version": {
"version_data": [
{
"version_value": "prior to version 2.54"
}
]
}
},
{
"product_name": "Featured Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.1"
}
]
}
},
{
"product_name": "Gallery Categories",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.9"
}
]
}
},
{
"product_name": "Gallery",
"version": {
"version_data": [
{
"version_value": "prior to version 4.5.0"
}
]
}
},
{
"product_name": "Google +1",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.4"
}
]
}
},
{
"product_name": "Google AdSense",
"version": {
"version_data": [
{
"version_value": "prior to version 1.44"
}
]
}
},
{
"product_name": "Google Analytics",
"version": {
"version_data": [
{
"version_value": "prior to version 1.7.1"
}
]
}
},
{
"product_name": "Google Captcha (reCAPTCHA)",
"version": {
"version_data": [
{
"version_value": "prior to version 1.28"
}
]
}
},
{
"product_name": "Google Maps",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.6"
}
]
}
},
{
"product_name": "Google Shortlink",
"version": {
"version_data": [
{
"version_value": "prior to version 1.5.3"
}
]
}
},
{
"product_name": "Google Sitemap",
"version": {
"version_data": [
{
"version_value": "prior to version 3.0.8"
}
]
}
},
{
"product_name": "Htaccess",
"version": {
"version_data": [
{
"version_value": "prior to version 1.7.6"
}
]
}
},
{
"product_name": "Job Board",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.3"
}
]
}
},
{
"product_name": "Latest Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 0.3"
}
]
}
},
{
"product_name": "Limit Attempts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.8"
}
]
}
},
{
"product_name": "LinkedIn",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Multilanguage",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.2"
}
]
}
},
{
"product_name": "PDF \u0026 Print",
"version": {
"version_data": [
{
"version_value": "prior to version 1.9.4"
}
]
}
},
{
"product_name": "Pagination",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.7"
}
]
}
},
{
"product_name": "Pinterest",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Popular Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
},
{
"product_name": "Portfolio",
"version": {
"version_data": [
{
"version_value": "prior to version 2.4"
}
]
}
},
{
"product_name": "Post to CSV",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.1"
}
]
}
},
{
"product_name": "Profile Extra",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.7"
}
]
}
},
{
"product_name": "PromoBar",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.1"
}
]
}
},
{
"product_name": "Quotes and Tips",
"version": {
"version_data": [
{
"version_value": "prior to version 1.32"
}
]
}
},
{
"product_name": "Re-attacher",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.9"
}
]
}
},
{
"product_name": "Realty",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.0"
}
]
}
},
{
"product_name": "Relevant - Related Posts",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.0"
}
]
}
},
{
"product_name": "Sender",
"version": {
"version_data": [
{
"version_value": "prior to version 1.2.1"
}
]
}
},
{
"product_name": "SMTP",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.0"
}
]
}
},
{
"product_name": "Social Buttons Pack",
"version": {
"version_data": [
{
"version_value": "prior to version 1.1.1"
}
]
}
},
{
"product_name": "Subscriber",
"version": {
"version_data": [
{
"version_value": "prior to version 1.3.5"
}
]
}
},
{
"product_name": "Testimonials",
"version": {
"version_data": [
{
"version_value": "prior to version 0.1.9"
}
]
}
},
{
"product_name": "Timesheet",
"version": {
"version_data": [
{
"version_value": "prior to version 0.1.5"
}
]
}
},
{
"product_name": "Twitter Button",
"version": {
"version_data": [
{
"version_value": "prior to version 2.55"
}
]
}
},
{
"product_name": "User Role",
"version": {
"version_data": [
{
"version_value": "prior to version 1.5.6"
}
]
}
},
{
"product_name": "Updater",
"version": {
"version_data": [
{
"version_value": "prior to version 1.35"
}
]
}
},
{
"product_name": "Visitors Online",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.0"
}
]
}
},
{
"product_name": "Zendesk Help Center",
"version": {
"version_data": [
{
"version_value": "prior to version 1.0.5"
}
]
}
}
]
},
"vendor_name": "BestWebSoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2017-000094",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094"
},
{
"name": "JVN#24834813",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN24834813/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2017-2171",
"datePublished": "2017-05-22T16:00:00",
"dateReserved": "2016-12-01T00:00:00",
"dateUpdated": "2024-08-05T13:48:03.789Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}