vendor:
CP Contact Form with Paypal Wordpress Plugin
by:
Nitin Venkatesh
8.8
CVSS
HIGH
Cross-site Request Forgery [CWE-352], Cross-site scripting[CWE-79], Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')[CWE-89]
352, 79, 89
CWE
Product Name: CP Contact Form with Paypal Wordpress Plugin
Affected Version From: v1.1.5
Affected Version To: v1.1.5
Patch Exists: YES
Related CWE: None/Unassigned/Fresh
CPE: a:wordpress:cp_contact_form_with_paypal:1.1.5
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: WordPress
2020
Cross-Site Request Forgery, Cross-Site Scripting and SQL Injection in CP Contact Form with Paypal WordPress Plugin v1.1.5
The forms in the admin area of the plugin allows CSRF. This gives the capacity for the attacker to add new forms, modify existing form settings, launch XSS attacks, export CSV files of the messages, delete forms, and perform SQL Injection.
Mitigation:
Upgrade to version 1.1.6 or later.