Medium severity6.4NVD Advisory· Published Jun 3, 2023· Updated Apr 8, 2026
CVE-2023-2302
CVE-2023-2302
Description
The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected products
1- cpe:2.3:a:vcita:contact_form_and_calls_to_action_by_vcita:*:*:*:*:*:wordpress:*:*Range: <=2.6.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/vcita-callback.phpnvdPatch
- blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcitanvdThird Party Advisory
- www.wordfence.com/threat-intel/vulnerabilities/id/4dfc237a-9157-4da9-ba8f-9daf2ba4f20bnvdThird Party Advisory
- plugins.trac.wordpress.org/changesetnvd
News mentions
0No linked articles in our index yet.