Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability in Contact Form to Any API
CVE-2024-30242

8.5HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
28 March 2024

Summary

An SQL Injection vulnerability exists in IT Path Solutions' Contact Form to Any API plugin that potentially allows unauthorized access to database contents through improper handling of user input. Specifically, this issue can be exploited when the plugin processes input fields that fail to adequately sanitize special characters used within SQL commands. By exploiting this flaw, attackers could manipulate SQL queries to retrieve or alter sensitive data stored within the database. It is crucial for users of the Contact Form to Any API plugin versions from n/a to 1.1.8 to assess their exposure and implement appropriate security measures.

Affected Version(s)

Contact Form to Any API <= 1.1.8

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Le Ngoc Anh (Patchstack Alliance)
.