WordPress Plugin Vulnerabilities

Contact Form 7 Database Addon < 1.2.5.4 - Authenticated SQL Injections

Description

The plugin did not properly sanitise the form_ids from the contact_form POST array parameter before using them in a SQL statement in the process_bulk_action() function. This could allow high privilege users, such as admin to perform SQL Injection against the DBMS via the bulk actions: delete, read and unread.

Note: Further SQL Injections have been fixed in 1.2.5.7.

Proof of Concept

Affects Plugins

Fixed in 1.2.5.4

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Verified
Yes

Timeline

Publicly Published
2021-01-21 (about 5 years ago)
Added
2021-01-21 (about 5 years ago)
Last Updated
2021-01-25 (about 4 years ago)

Other