
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-3350 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the Contact Bank WordPress plugin versions 3.0.30 and below. The vulnerability was discovered by Zhang Yunpei and publicly disclosed on September 29, 2022 (WPScan).
The vulnerability exists because the plugin does not properly sanitize and escape some of its Form settings. This security flaw has been assigned a CVSS score of 3.4 (Low) and is classified under CWE-79 (Cross-Site Scripting). The vulnerability specifically affects the form description field in the plugin's settings (WPScan).
This vulnerability allows high-privilege users such as administrators to perform Stored Cross-Site Scripting attacks, even when the unfiltered_html capability is disallowed (for example in multisite setup). The XSS payload can be triggered both in the Manage Forms dashboard and in pages/posts where the form is embedded, provided there is at least one field in the form (WPScan).
As of the vulnerability disclosure, there is no known fix available for this security issue (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."