Summary
Detail | |||
---|---|---|---|
Vendor | Mondula | First view | 2018-07-25 |
Product | Multi Step Form | Last view | 2025-01-16 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:mondula:multi_step_form:*:*:*:*:*:wordpress:*:* | 8 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2025-01-16 | CVE-2024-12427 | The Multi Step Form plugin for WordPress is vulnerable to unauthorized limited file upload due to a missing capability check on the fw_upload_file AJAX action in all versions up to, and including, 1.7.23. This makes it possible for unauthenticated attackers to upload limited file types such as images. |
9.8 | 2024-10-29 | CVE-2024-50428 | Missing Authorization vulnerability in Mondula GmbH Multi Step Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Multi Step Form: from n/a through 1.7.21. |
0 | 2024-02-21 | CVE-2024-25905 | Cross-Site Request Forgery (CSRF) vulnerability in Mondula GmbH Multi Step Form.This issue affects Multi Step Form: from n/a through 1.7.18. |
4.8 | 2023-12-21 | CVE-2023-50832 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mondula GmbH Multi Step Form allows Stored XSS.This issue affects Multi Step Form: from n/a through 1.7.13. |
8.8 | 2023-11-22 | CVE-2023-47758 | Cross-Site Request Forgery (CSRF) vulnerability in Mondula GmbH Multi Step Form plugin <=Â 1.7.11 versions. |
4.8 | 2023-01-09 | CVE-2022-4196 | The Multi Step Form WordPress plugin before 1.7.8 does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
5.4 | 2018-12-20 | CVE-2018-14846 | The Mondula Multi Step Form plugin before 1.2.8 for WordPress has multiple stored XSS via wp-admin/admin-ajax.php. |
6.1 | 2018-07-25 | CVE-2018-14430 | The Mondula Multi Step Form plugin through 1.2.5 for WordPress allows XSS via the fw_data [id][1], fw_data [id][2], fw_data [id][3], fw_data [id][4], or email field of the contact form, exploitable with an fw_send_email action to wp-admin/admin-ajax.php. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
66% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
33% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |