CVE-2025-48143
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-09

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in salesup2019 Formulario de contacto SalesUp! formularios-de-contacto-salesup allows Reflected XSS.This issue affects Formulario de contacto SalesUp!: from n/a through <= 1.0.14.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-09
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-48143 is a reflected Cross Site Scripting (XSS) vulnerability in the WordPress plugin "Formulario de contacto SalesUp!" versions up to 1.0.14. It allows unauthenticated attackers to inject malicious scripts into websites using the plugin. These scripts execute when visitors access the compromised site, potentially causing unauthorized actions or content manipulation. [1]


How can this vulnerability impact me? :

This vulnerability can lead to attackers injecting malicious scripts that execute in the browsers of site visitors. This can result in unauthorized actions such as redirects, displaying unwanted advertisements, or manipulation of website content. It poses a moderate risk and can compromise the integrity and trustworthiness of the affected website. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for reflected Cross Site Scripting (XSS) attack attempts targeting the Formulario de contacto SalesUp! plugin. Since it involves injection of malicious scripts in web requests, you can look for suspicious HTTP requests containing script tags or typical XSS payloads in URL parameters or form inputs related to the plugin. Specific commands are not provided in the resources, but using web application firewall (WAF) logs or tools like curl or Burp Suite to send crafted requests and observe responses may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the virtual patch (vPatch) released by Patchstack, which automatically blocks attack attempts exploiting this vulnerability until an official fix is available. Site administrators should promptly deploy this virtual patch to protect their sites. Additionally, monitoring for signs of compromise and seeking professional incident response if exploitation is suspected are recommended. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart