An open redirect in the Ninja Forms plugin before 3.3.19.1 for WordPress allows Remote Attackers to redirect a user via the lib/StepProcessing/step-processing.php (aka submissions download page) redirect parameter.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/1982808/ninja-forms/trunk/lib/StepProcessing/step-processing.php | Exploit Third Party Advisory |
https://wordpress.org/plugins/ninja-forms/#developers | Product Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9154 | |
https://plugins.trac.wordpress.org/changeset/1982808/ninja-forms/trunk/lib/StepProcessing/step-processing.php | Exploit Third Party Advisory |
https://wordpress.org/plugins/ninja-forms/#developers | Product Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9154 |
Configurations
History
21 Nov 2024, 03:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/1982808/ninja-forms/trunk/lib/StepProcessing/step-processing.php - Exploit, Third Party Advisory | |
References | () https://wordpress.org/plugins/ninja-forms/#developers - Product, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/9154 - |
Information
Published : 2018-12-03 06:29
Updated : 2024-11-21 03:58
NVD link : CVE-2018-19796
Mitre link : CVE-2018-19796
CVE.ORG link : CVE-2018-19796
JSON object : View
Products Affected
ninjaforms
- ninja_forms
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')