CVE-2024-11386
Description
The GatorMail SmartForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gatormailsmartform' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in GatorMail SmartForms WordPress plugin up to v1.1.0 via unsanitized shortcode attributes, exploitable by contributor-level users.
Vulnerability
Overview
The GatorMail SmartForms plugin for WordPress versions up to and including 1.1.0 is vulnerable to Stored Cross-Site Scripting (XSS). The flaw exists in the plugin's [gatormailsmartform] shortcode, where user-supplied attributes are not properly sanitized or escaped before being output. This allows malicious HTML or JavaScript to be stored on the server and executed in the browsers of visitors who access the injected page [1].
Exploitation
Prerequisites
An attacker must have at least a WordPress contributor-level account to insert or modify the vulnerable shortcode. The attack does not require high privileges; any authenticated user who can add content (such as posts or pages) using the shortcode can inject arbitrary web scripts. The plugin's own documentation shows the shortcode accepts an id attribute, and this is the vector for the injection [1].
Impact
When a user visits a page containing an injected shortcode, the stored script executes in their browser. This can lead to session hijacking, credential theft, defacement, or other actions that the victim's browser allows. As the attack is stored, every subsequent visitor to the affected page is at risk.
Mitigation
Status
The vulnerability is fixed in version 1.1.1 of the plugin, which improved security and was tested against the latest WordPress version. Administrators are strongly advised to update immediately. No workaround is provided besides upgrading to the patched release [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=1.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.