VYPR
High severity7.1NVD Advisory· Published Oct 6, 2024· Updated Apr 23, 2026

CVE-2024-47300

CVE-2024-47300

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Imran Tauqeer CubeWP Forms cubewp-forms allows Stored XSS.This issue affects CubeWP Forms: from n/a through <= 1.1.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in CubeWP Forms plugin for WordPress allows attackers to inject malicious scripts via improper input neutralization.

CubeWP Forms versions 1.1.1 and earlier for WordPress contain a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation. The vulnerability exists in the cubewp-forms component, allowing arbitrary HTML and JavaScript to be saved and later executed when an administrator or other user views the affected content.

Exploitation requires an authenticated user with contributor-level privileges or higher to submit a crafted form payload. No additional privileges are needed beyond the ability to submit forms, making it accessible to a wide range of WordPress user roles. The stored payload is triggered when a victim administrator loads the page containing the malicious input, meeting the user interaction component of the CVSS score (7.1, High). Attackers commonly chain this type of vulnerability in automated campaigns targeting thousands of sites simultaneously [1].

Successful exploitation enables an attacker to inject persistent scripts that can perform redirections, display advertisements, steal session cookies, or deface pages. Since the malicious payload is stored in the database, every visitor to the affected page will execute it, amplifying the impact across the site’s user base [1].

The vendor released version 1.1.2, which resolves the vulnerability by properly sanitizing form input. All users are strongly advised to update immediately. If an immediate patch is not possible, a virtual patch or security rule can block exploit attempts until the update is applied [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.