Plugin vulnerable to Server-Side Request Forgery
CVE-2024-1812

7.2HIGH

Summary

The Everest Forms plugin for WordPress is susceptible to a Server-Side Request Forgery vulnerability in all versions up to and including 2.0.7. This vulnerability arises through the 'font_url' parameter, enabling unauthorized attackers to initiate web requests to arbitrary locations originating from the affected web application. Consequently, this can lead to the querying and potential modification of sensitive information from internal services, posing significant risks to the security of the system and its data integrity.

Affected Version(s)

Everest Forms – Build Contact Forms, Surveys, Polls, Quizzes, Newsletter & Application Forms, and Many More with Ease! * <= 2.0.7

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

hoangnd123123
.