WordPress Plugin Vulnerabilities
Contact Form Generator < 2.5.5 - Multiple Cross-Site Request Forgery (CSRF)
Description
The plugin does not have any CSRF checks in place on its creating/editing/deleting Forms/Fields and Templates actions, allowing attacker to make logged in admin perform such actions. Furthermore, the plugin also does not sanitise and escape any data, which could lead to Stored XSS issue as well.
The original issue is from 2015, and was about CSRF on the delete action, however the current latest version (2.1.86) is still affected, and CSRF is affecting any action, as well as allowing for XSS attacks.
Version 2.5.0 attempts to thwart CSRF attacks with a homemade request token validation routine, but uses very weak pseudorandom generators to do so, making it still exploitable.
Proof of Concept
Affects Plugins
References
Classification
Type
CSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Submitter
ethicalhack3r
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2015-09-07 (about 10 years ago)
Added
2015-09-08 (about 10 years ago)
Last Updated
2023-07-11 (about 2 years ago)