Vulnerabilites related to Vault Group Pty Ltd - VaultRE Contact Form 7
cve-2025-31101
Vulnerability from cvelistv5
Published
2025-03-27 22:25
Modified
2025-03-28 15:21
Severity ?
EPSS score ?
Summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vault Group Pty Ltd VaultRE Contact Form 7 allows Stored XSS.This issue affects VaultRE Contact Form 7: from n/a through 1.0.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Vault Group Pty Ltd | VaultRE Contact Form 7 |
Version: n/a < |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-31101", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-28T15:21:42.582958Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-28T15:21:55.779Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { collectionURL: "https://github.com", defaultStatus: "unaffected", packageName: "wp-plugin-contact-form-7", product: "VaultRE Contact Form 7", vendor: "Vault Group Pty Ltd", versions: [ { lessThanOrEqual: "1.0", status: "affected", version: "n/a", versionType: "custom", }, ], }, ], credits: [ { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Psai", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vault Group Pty Ltd VaultRE Contact Form 7 allows Stored XSS.<p>This issue affects VaultRE Contact Form 7: from n/a through 1.0.</p>", }, ], value: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vault Group Pty Ltd VaultRE Contact Form 7 allows Stored XSS.This issue affects VaultRE Contact Form 7: from n/a through 1.0.", }, ], impacts: [ { capecId: "CAPEC-592", descriptions: [ { lang: "en", value: "CAPEC-592 Stored XSS", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-27T22:25:04.290Z", orgId: "21595511-bba5-4825-b968-b78d1f9984a3", shortName: "Patchstack", }, references: [ { tags: [ "vdb-entry", ], url: "https://patchstack.com/database/wordpress/plugin/wp-plugin-contact-form-7/vulnerability/wordpress-vaultre-contact-form-7-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", }, ], source: { discovery: "EXTERNAL", }, tags: [ "x_open-source", ], title: "WordPress VaultRE Contact Form 7 plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "21595511-bba5-4825-b968-b78d1f9984a3", assignerShortName: "Patchstack", cveId: "CVE-2025-31101", datePublished: "2025-03-27T22:25:04.290Z", dateReserved: "2025-03-26T09:26:19.815Z", dateUpdated: "2025-03-28T15:21:55.779Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }