Vulnerabilities (CVE)

Filtered by vendor Mondula Subscribe
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-25905 1 Mondula 1 Multi Step Form 2025-04-23 N/A 5.4 MEDIUM
Cross-Site Request Forgery (CSRF) vulnerability in Mondula GmbH Multi Step Form.This issue affects Multi Step Form: from n/a through 1.7.18.
CVE-2022-4196 1 Mondula 1 Multi Step Form 2025-04-09 N/A 4.8 MEDIUM
The Multi Step Form WordPress plugin before 1.7.8 does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
CVE-2024-12427 1 Mondula 1 Multi Step Form 2025-03-03 N/A 5.3 MEDIUM
The Multi Step Form plugin for WordPress is vulnerable to unauthorized limited file upload due to a missing capability check on the fw_upload_file AJAX action in all versions up to, and including, 1.7.23. This makes it possible for unauthenticated attackers to upload limited file types such as images.
CVE-2024-50428 1 Mondula 1 Multi Step Form 2025-02-25 N/A 9.8 CRITICAL
Missing Authorization vulnerability in Mondula GmbH Multi Step Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Multi Step Form: from n/a through 1.7.21.
CVE-2023-50832 1 Mondula 1 Multi Step Form 2023-12-30 N/A 4.8 MEDIUM
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mondula GmbH Multi Step Form allows Stored XSS.This issue affects Multi Step Form: from n/a through 1.7.13.
CVE-2023-47758 1 Mondula 1 Multi Step Form 2023-11-27 N/A 8.8 HIGH
Cross-Site Request Forgery (CSRF) vulnerability in Mondula GmbH Multi Step Form plugin <= 1.7.11 versions.
CVE-2018-14846 1 Mondula 1 Multi Step Form 2019-01-24 3.5 LOW 5.4 MEDIUM
The Mondula Multi Step Form plugin before 1.2.8 for WordPress has multiple stored XSS via wp-admin/admin-ajax.php.
CVE-2018-14430 1 Mondula 1 Multi Step Form 2018-09-20 4.3 MEDIUM 6.1 MEDIUM
The Mondula Multi Step Form plugin through 1.2.5 for WordPress allows XSS via the fw_data [id][1], fw_data [id][2], fw_data [id][3], fw_data [id][4], or email field of the contact form, exploitable with an fw_send_email action to wp-admin/admin-ajax.php.