WordPress Plugin Vulnerabilities
Contact Form 7 Database Addon < 1.2.5.4 - Authenticated SQL Injections
Description
The plugin did not properly sanitise the form_ids from the contact_form POST array parameter before using them in a SQL statement in the process_bulk_action() function. This could allow high privilege users, such as admin to perform SQL Injection against the DBMS via the bulk actions: delete, read and unread.
Note: Further SQL Injections have been fixed in 1.2.5.7.
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-01-21 (about 5 years ago)
Added
2021-01-21 (about 5 years ago)
Last Updated
2021-01-25 (about 4 years ago)