Filtered by vendor Zealousweb Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-12834 2 Wordpress, Zealousweb 2 Wordpress, Accept Stripe Payments Using Contact Form 7 2025-12-12 6.1 Medium
The Accept Stripe Payments Using Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'failure_message' parameter in versions up to, and including, 3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVE-2024-12255 1 Zealousweb 1 Accept Stripe Payments Using Contact Form 7 2025-07-02 5.3 Medium
The Accept Stripe Payments Using Contact Form 7 plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.5 via the cf7sa-info.php file that returns phpinfo() data. This makes it possible for unauthenticated attackers to extract configuration information that can be leveraged in another attack.
CVE-2022-3070 1 Zealousweb 1 Generate Pdf Using Contact Form 7 2025-05-22 4.8 Medium
The Generate PDF WordPress plugin before 3.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2024-37555 1 Zealousweb 1 Generate Pdf Using Contact Form 7 2024-11-21 9.1 Critical
Unrestricted Upload of File with Dangerous Type vulnerability in ZealousWeb Generate PDF using Contact Form 7.This issue affects Generate PDF using Contact Form 7: from n/a through 4.0.6.
CVE-2023-49188 1 Zealousweb 1 Track Geolocation Of Users Using Contact Form 7 2024-11-21 5.9 Medium
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ZealousWeb Track Geolocation Of Users Using Contact Form 7 allows Stored XSS.This issue affects Track Geolocation Of Users Using Contact Form 7: from n/a through 2.0.