The WebDorado Contact Form Builder plugin before 1.0.69 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2019/Apr/35 | Mailing List Third Party Advisory |
https://lists.openwall.net/full-disclosure/2019/04/23/1 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/contact-form-builder/#developers | Release Notes |
https://wpvulndb.com/vulnerabilities/9260 | Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Apr/35 | Mailing List Third Party Advisory |
https://lists.openwall.net/full-disclosure/2019/04/23/1 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/contact-form-builder/#developers | Release Notes |
https://wpvulndb.com/vulnerabilities/9260 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-04-26 22:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11557
Mitre link : CVE-2019-11557
CVE.ORG link : CVE-2019-11557
JSON object : View
Products Affected
web-dorado
- wp_form_builder