{"containers":{"cna":{"affected":[{"product":"Contact Form Plugin","vendor":"BestWebSoft","versions":[{"status":"affected","version":"4.0.0"}]}],"credits":[{"lang":"en","value":"Julien Rentrop"}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in BestWebSoft Contact Form Plugin 4.0.0. This affects an unknown part. The manipulation leads to basic cross site scripting (Stored). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.2 is able to address this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.5,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-80","description":"CWE-80 Basic Cross Site Scripting","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-06-16T12:20:22.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"http://seclists.org/fulldisclosure/2017/Feb/100"},{"tags":["x_refsource_MISC"],"url":"https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97389"}],"title":"BestWebSoft Contact Form Plugin Stored cross site scriting","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20055","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"BestWebSoft Contact Form Plugin Stored cross site scriting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Contact Form Plugin","version":{"version_data":[{"version_value":"4.0.0"}]}}]},"vendor_name":"BestWebSoft"}]}},"credit":"Julien Rentrop","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability classified as problematic has been found in BestWebSoft Contact Form Plugin 4.0.0. This affects an unknown part. The manipulation leads to basic cross site scripting (Stored). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.2 is able to address this issue. It is recommended to upgrade the affected component."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"3.5","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-80 Basic Cross Site Scripting"}]}]},"references":{"reference_data":[{"name":"http://seclists.org/fulldisclosure/2017/Feb/100","refsource":"MISC","url":"http://seclists.org/fulldisclosure/2017/Feb/100"},{"name":"https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html","refsource":"MISC","url":"https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html"},{"name":"https://vuldb.com/?id.97389","refsource":"MISC","url":"https://vuldb.com/?id.97389"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:25.194Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2017/Feb/100"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://sumofpwn.nl/advisory/2016/stored_cross_site_scripting_vulnerability_in_contact_form_wordpress_plugin.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97389"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:11:02.807428Z","id":"CVE-2017-20055","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:24:31.117Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20055","datePublished":"2022-06-16T12:20:22.000Z","dateReserved":"2022-06-13T00:00:00.000Z","dateUpdated":"2025-04-15T14:24:31.117Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}