The One Page Express Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's one_page_express_contact_form shortcode in all versions up to, and including, 1.6.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Wordfence
Published: 2024-06-07T07:35:27.988Z
Updated: 2024-08-01T20:47:41.666Z
Reserved: 2024-05-09T19:02:46.357Z
Link: CVE-2024-4703
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T20:47:41.666Z
 NVD
                        NVD
                    Status : Modified
Published: 2024-06-07T08:15:32.413
Modified: 2024-11-21T09:43:24.660
Link: CVE-2024-4703
 Redhat
                        Redhat
                    No data.