Insecure Direct Object Reference in Contact Form 7 Dynamic Text Extension for WordPress
CVE-2023-6630
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 11 January 2024
Summary
A security flaw exists in the Contact Form 7 – Dynamic Text Extension plugin for WordPress, affecting all versions up to and including 4.1.0. The vulnerability arises from inadequate validation of a user-controlled key utilized in CF7_get_custom_field and CF7_get_current_user shortcodes. This loophole permits authenticated attackers with contributor access or higher to potentially access sensitive metadata from arbitrary post types by referring to the post via its ID and the metadata using its key. Immediate action is advised to mitigate this risk to safeguard user data.
Affected Version(s)
Contact Form 7 – Dynamic Text Extension * <= 4.1.0
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Francesco Carlucci