Cross-site request forgery (CSRF) vulnerability in the Encrypted Contact Form plugin before 1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the iframe_url parameter in an Update Page action in the conformconf page to wp-admin/options-general.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/37264/ | exploit vdb entry third party advisory |
https://wpvulndb.com/vulnerabilities/7992 | third party advisory |
https://wordpress.org/plugins/encrypted-contact-form/changelog/ | third party advisory patch |
http://www.securityfocus.com/bid/73433 | vdb entry third party advisory |
http://packetstormsecurity.com/files/132209/WordPress-Encrypted-Contact-Form-1.0.4-CSRF-XSS.html | vdb entry third party advisory |
http://marc.info/?l=bugtraq&m=142607790919348&w=2 | third party advisory vendor advisory |
http://seclists.org/fulldisclosure/2015/May/63 | mailing list exploit vdb entry third party advisory |
http://www.securityfocus.com/archive/1/535699/100/0/threaded | mailing list vdb entry third party advisory |
https://plugins.trac.wordpress.org/changeset/1125443/ | release notes |