Arbitrary PHP Code Execution Vulnerability in Contact Form 7 Email Add-on
CVE-2024-10898

8.8HIGH

Key Information:

Vendor
Krishaweb
Status
Contact Form 7 Email Add On
Vendor
CVE Published:
21 November 2024

Summary

The Contact Form 7 Email Add On plugin for WordPress is susceptible to a Local File Inclusion vulnerability through the function cf7_email_add_on_add_admin_template(). This vulnerability impacts all versions up to and including version 1.9, allowing authenticated users with Contributor-level access or higher to include and execute arbitrary PHP files residing on the server. Exploitation of this vulnerability could lead to unauthorized code execution, data exfiltration, and bypassing of access controls, particularly in scenarios when PHP files can be uploaded and included by the attacker.

Affected Version(s)

Contact Form 7 Email Add on * <= 1.9

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

ngocanh le
.