Cross-site request forgery (CSRF) vulnerability in the Encrypted Contact Form plugin before 1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the iframe_url parameter in an Update Page action in the conformconf page to wp-admin/options-general.php.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/encrypted-contact-form/changelog/ | Patch Third Party Advisory |
http://seclists.org/fulldisclosure/2015/May/63 | Exploit Mailing List Third Party Advisory VDB Entry |
https://plugins.trac.wordpress.org/changeset/1125443/ | Release Notes |
https://www.exploit-db.com/exploits/37264/ | Exploit Third Party Advisory VDB Entry |
http://marc.info/?l=bugtraq&m=142607790919348&w=2 | Third Party Advisory |
http://www.securityfocus.com/bid/73433 | Third Party Advisory VDB Entry |
https://wpvulndb.com/vulnerabilities/7992 | Third Party Advisory |
http://packetstormsecurity.com/files/132209/WordPress-Encrypted-Contact-Form-1.0.4-CSRF-XSS.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/535699/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2015-06-09 07:59
Updated : 2019-10-09 16:14
NVD link : CVE-2015-4010
Mitre link : CVE-2015-4010
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
everybit
- encrypted_contact_form