The WebDorado Contact Form plugin before 1.13.5 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/contact-form-maker/#developers | Third Party Advisory |
https://lists.openwall.net/full-disclosure/2019/04/05/12 | Mailing List Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Apr/37 | Exploit Mailing List Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9252 | Third Party Advisory |
Configurations
Information
Published : 2019-04-29 07:29
Updated : 2023-02-27 06:37
NVD link : CVE-2019-11591
Mitre link : CVE-2019-11591
JSON object : View
CWE
Products Affected
web-dorado
- contact_form