Security for everyone

CVE-2017-18492 Scanner

Detects 'Cross-Site Scripting (XSS)' vulnerability in Contact Form plugin for WordPress affects v. before 1.5.7.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



The Contact Form plugin for WordPress is a widely-used plugin that allows website owners to create customized forms for their visitors to fill out. These forms can be used for a variety of purposes, such as collecting feedback, gathering user information, or processing orders. The plugin is popular among WordPress users due to its easy-to-use interface and vast array of customization options.

One of the most concerning vulnerabilities that has been discovered in the Contact Form plugin is CVE-2017-18492. This vulnerability allows attackers to input malicious code into the Contact Form, which can then be executed when a user submits the form. Essentially, this means that if a website is using an outdated version of the plugin, an attacker could potentially execute code on that site without the website owner's knowledge.

If this vulnerability is exploited, it can lead to a variety of negative consequences. For example, an attacker could steal sensitive information such as login credentials or credit card numbers from visitors who submit the form. Additionally, an attacker could use the vulnerability to inject malware onto the website, infecting the devices of any visitors who access the site.

Thanks to the pro features of the platform, website owners can easily and quickly learn about vulnerabilities in their digital assets. By utilizing this platform, website owners can gain access to a wealth of information on potential vulnerabilities and steps they can take to protect themselves and their visitors. With the increasing prevalence of cyber attacks, it's more important than ever for website owners to take proactive steps to secure their online presence.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture