VYPR
Medium severity6.1NVD Advisory· Published May 10, 2026· Updated May 12, 2026

CVE-2022-50959

CVE-2022-50959

Description

WordPress Contact Form Builder 1.6.1 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by exploiting the form_id parameter. Attackers can craft malicious URLs to code_generator.php with script payloads in the form_id parameter to execute arbitrary JavaScript in victim browsers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

WordPress Contact Form Builder 1.6.1 contains a reflected cross-site scripting vulnerability in code_generator.php via the form_id parameter, allowing unauthenticated attackers to execute arbitrary JavaScript.

Vulnerability

Details The WordPress Contact Form Builder plugin version 1.6.1 is vulnerable to reflected cross-site scripting (XSS) in the code_generator.php file. The form_id parameter is not properly sanitized, allowing attackers to inject arbitrary JavaScript code [2]. This vulnerability is classified as CWE-79 and has a CVSS v3 score of 6.1.

Exploitation

Attack Surface Exploitation requires only that a victim visits a crafted URL containing a malicious payload in the form_id parameter, such as http://example.com/code_generator.php?form_id=<script>alert('xss')</script> [3]. No authentication is needed, making the attack vector network-based with low complexity. The attacker has no privileges, but user interaction (clicking the link) is required.

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites, depending on the attacker's objective.

Mitigation

The plugin has been closed as of March 7, 2024, due to security issues and is no longer available for download [1]. Sites running Contact Form Builder 1.6.1 are exposed and should remove the plugin immediately as no patched version is available. No workaround is known.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.