We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47280

Umbraco.Forms has HTML injection vulnerability in 'Send email' workflow



Description

Umbraco Forms is a form builder that integrates with the Umbraco content management system. Starting in the 7.x branch and prior to versions 13.4.2 and 15.1.2, the 'Send email' workflow does not HTML encode the user-provided field values in the sent email message, making any form with this workflow configured vulnerable, as it allows sending the message from a trusted system and address, potentially bypassing spam and email client security systems. This issue affects all (supported) versions Umbraco Forms and is patched in 13.4.2 and 15.1.2. Unpatched or unsupported versions can workaround this issue by using the `Send email with template (Razor)` workflow instead or writing a custom workflow type. To avoid accidentally using the vulnerable workflow again, the `SendEmail` workflow type can be removed using a composer available in the GitHub Security Advisory for this vulnerability.

Reserved 2025-05-05 | Published 2025-05-13 | Updated 2025-05-13 | Assigner GitHub_M


LOW: 2.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:H/SA:N/E:U

Problem types

CWE-116: Improper Encoding or Escaping of Output

Product status

>= 7.0.0, < 13.4.2
affected

>= 15.0.0, < 15.1.2
affected

References

github.com/...Issues/security/advisories/GHSA-2qrj-g9hq-chph

cve.org (CVE-2025-47280)

nvd.nist.gov (CVE-2025-47280)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47280

Support options

Helpdesk Chat, Email, Knowledgebase