CVE-2021-24565

The Contact Form 7 Captcha WordPress plugin before 0.0.9 does not have any CSRF check in place when saving its settings, allowing attacker to make a logged in user with the manage_options change them. Furthermore, the settings are not escaped when output in attributes, leading to a Stored Cross-Site Scripting issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:contact_form_7_captcha_project:contact_form_7_captcha:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/2570402 - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2570402 - Patch, Third Party Advisory
References () https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 - Exploit, Third Party Advisory

Information

Published : 2021-08-23 12:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24565

Mitre link : CVE-2021-24565

CVE.ORG link : CVE-2021-24565


JSON object : View

Products Affected

contact_form_7_captcha_project

  • contact_form_7_captcha
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-352

Cross-Site Request Forgery (CSRF)