Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Form2email
Form2email contact Form To Email Wordpress Wordpress wordpress |
|
| Vendors & Products |
Form2email
Form2email contact Form To Email Wordpress Wordpress wordpress |
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Contact Form to Email 1.3.24 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by creating forms with script tags in the form name field. Attackers can craft form names containing JavaScript code that executes when other logged-in users access the form management page, enabling session hijacking or credential theft. | |
| Title | WordPress Contact Form to Email 1.3.24 Stored XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T16:14:35.639Z
Reserved: 2026-02-01T11:24:18.716Z
Link: CVE-2021-47926
Updated: 2026-05-11T16:14:09.377Z
Status : Deferred
Published: 2026-05-10T13:16:28.573
Modified: 2026-05-12T14:24:15.210
Link: CVE-2021-47926
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:23:36Z