Input validation vulnerability in Quick Contact Form 6.1

The Quick Contact Form plugin for WordPress is vulnerable to a type of cyber attack called Cross-Site Scripting. This means that in versions of the plugin before 6.1, attackers can insert malicious web scripts into the plugin through the ‘qcfname4’ parameter. This malicious code can then execute in the browsers of people who use the plugin, giving the attackers access to private information. It is important to make sure you are running the latest version of the plugin to protect yourself from this kind of attack.

Detected in:

Quick Contact Form fixed vulnerable versions: >= * < 6.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.