A stored cross-site scripting (XSS) vulnerability in the Contact Form 7 Datepicker WordPress plugin will not receive a patch, leaving websites exposed to attacks, WordPress security firm Defiant reports.
The plugin, designed to integrate with the Contact Form 7 contact form management plugin, had over 100,000 installations when the vulnerability was discovered. The authenticated XSS bug is considered high severity.
However, the plugin is no longer maintained, meaning that the vulnerability won’t receive a patch and that all installations remain affected.
The WordPress plugin’s team has already removed Contact Form 7 Datepicker from the repository for review. Contacted by Defiant, the developer confirmed they had no plans to maintain the application. Contact Form 7, which has over 5 million active installations, is not affected.
Contact Form 7 Datepicker was designed to help users add a datepicker to forms generated by Contact Form 7, and also features the ability to modify settings for these datepickers.
The discovered vulnerability resides in an AJAX action calling a function the plugin uses to perform its functionality, which lacks a capability check or a nonce check.
Site admins are advised to deactivate and remove the Contact Form 7 Datepicker plugin and find an alternative plugin that can provide similar functionality.
Defiant has refrained from publishing details on the discovered vulnerability, due to the large number of impacted websites.