Multiple cross-site request forgery (CSRF) vulnerabilities in wp-contact-form/options-contactform.php in the WP-ContactForm 1.5 alpha and earlier plugin for WordPress allow remote attackers to perform actions as administrators via the (1) wpcf_question, (2) wpcf_success_msg, or (3) wpcf_error_msg parameter to wp-admin/admin.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://securityvulns.ru/Sdocument546.html | third party advisory broken link |
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html | mailing list exploit third party advisory broken link |
http://websecurity.com.ua/1600/ | third party advisory |
http://securityvulns.ru/Sdocument667.html | third party advisory broken link |
http://www.securityfocus.com/archive/1/485786/100/0/threaded | mailing list vdb entry third party advisory broken link |
http://securityreason.com/securityalert/3539 | third party advisory broken link |
http://websecurity.com.ua/1641/ | third party advisory |