SQL Injection Vulnerability in Contact Form 7 Admin Side Data Storage
CVE-2024-1776

7.2HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
23 February 2024

Summary

The Contact Form 7 plugin for WordPress contains a vulnerability in its Admin side data storage mechanism, specifically affecting the handling of the 'form-id' parameter. This weakness stems from inadequate escaping of user-supplied input and a lack of sufficient SQL query preparation. As a result, authenticated attackers with administrator-level access can exploit this flaw by injecting arbitrary SQL queries into existing queries. This enables them to extract sensitive data from the database, potentially compromising user information and overall site integrity.

Affected Version(s)

Admin side data storage for Contact Form 7 * <= 1.1.1

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zulu caPWN
.