The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
Configuration 1 (hide)
|
History
09 Jun 2023, 13:43
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita - Third Party Advisory | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/2345c972-9fd4-4709-8bde-315ab54f60e2?source=cve - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/vcita-callback.php - Patch | |
CPE | cpe:2.3:a:vcita:contact_form_and_calls_to_action_by_vcita:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-352 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
03 Jun 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-03 05:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-2303
Mitre link : CVE-2023-2303
CVE.ORG link : CVE-2023-2303
JSON object : View
Products Affected
vcita
- contact_form_and_calls_to_action_by_vcita
CWE
CWE-352
Cross-Site Request Forgery (CSRF)