Arbitrary PHP Code Execution Vulnerability in Contact Form 7 Email Add-on
CVE-2024-10898
8.8HIGH
Key Information:
- Vendor
- Krishaweb
- Status
- Contact Form 7 Email Add On
- Vendor
- CVE Published:
- 21 November 2024
Summary
The Contact Form 7 Email Add On plugin for WordPress is susceptible to a Local File Inclusion vulnerability through the function cf7_email_add_on_add_admin_template(). This vulnerability impacts all versions up to and including version 1.9, allowing authenticated users with Contributor-level access or higher to include and execute arbitrary PHP files residing on the server. Exploitation of this vulnerability could lead to unauthorized code execution, data exfiltration, and bypassing of access controls, particularly in scenarios when PHP files can be uploaded and included by the attacker.
Affected Version(s)
Contact Form 7 Email Add on * <= 1.9
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
ngocanh le