SQL Injection Vulnerability in Multi Step for Contact Form
CVE-2024-47331

9.8CRITICAL

Key Information:

Vendor
Ninjateam
Status
Multi Step For Contact Form
Vendor
CVE Published:
11 October 2024

Summary

A vulnerability exists in NinjaTeam's Multi Step for Contact Form plugin that enables SQL Injection due to improper neutralization of special elements used in SQL commands. This flaw can be exploited by attackers to gain unauthorized access to the underlying database, potentially leading to the exposure of sensitive information or further attacks on the affected system. The issue impacts versions up to 2.7.7, necessitating immediate action from users to secure their applications against possible exploitation.

Affected Version(s)

Multi Step for Contact Form <= 2.7.7

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hakiduck (Patchstack Alliance)
.