Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-phgc-94qm-68px

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the various AJAX actions in the plugin to do a variety of things. For example, an attacker could use wpcf7r_reset_settings to reset the plugin’s settings, wpcf7r_add_action to add actions to a form, and more.

In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the various AJAX actions in the plugin to do a variety of things. For example, an attacker could use wpcf7r_reset_settings to reset the plugin’s settings, wpcf7r_add_action to add actions to a form, and more.

EPSS

Процентиль: 48%
0.00248
Низкий

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 6.3
nvd
больше 4 лет назад

In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the various AJAX actions in the plugin to do a variety of things. For example, an attacker could use wpcf7r_reset_settings to reset the plugin’s settings, wpcf7r_add_action to add actions to a form, and more.

EPSS

Процентиль: 48%
0.00248
Низкий

Дефекты

CWE-863