The Contact Form Builder by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.9.1. This is due to missing nonce validation on the ls_parse_vcita_callback function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
History
09 Jun 2023, 13:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vcita:contact_form_builder_by_vcita:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CWE | CWE-352 | |
References | (MISC) https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/browser/contact-form-with-a-meeting-scheduler-by-vcita/trunk/system/parse_vcita_callback.php#L55 - Patch | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/61c39f5f-3b17-4e4d-824e-241159a73400?source=cve - Third Party Advisory |
03 Jun 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-03 05:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-2301
Mitre link : CVE-2023-2301
CVE.ORG link : CVE-2023-2301
JSON object : View
Products Affected
vcita
- contact_form_builder_by_vcita
CWE
CWE-352
Cross-Site Request Forgery (CSRF)