The Contact Form 7 Captcha WordPress plugin before 0.0.9 does not have any CSRF check in place when saving its settings, allowing attacker to make a logged in user with the manage_options change them. Furthermore, the settings are not escaped when output in attributes, leading to a Stored Cross-Site Scripting issue.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2570402 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2570402 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/2570402 - Patch, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 - Exploit, Third Party Advisory |
Information
Published : 2021-08-23 12:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24565
Mitre link : CVE-2021-24565
CVE.ORG link : CVE-2021-24565
JSON object : View
Products Affected
contact_form_7_captcha_project
- contact_form_7_captcha