CVE-2021-24164

In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:52

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89 - Exploit, Third Party Advisory
References () https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/ - Third Party Advisory () https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/ - Third Party Advisory

Information

Published : 2021-04-05 19:15

Updated : 2024-11-21 05:52


NVD link : CVE-2021-24164

Mitre link : CVE-2021-24164

CVE.ORG link : CVE-2021-24164


JSON object : View

Products Affected

ninjaforms

  • ninja_forms
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-862

Missing Authorization