Cross-site request forgery in Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress - #VU47484

 

Cross-site request forgery in Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress - #VU47484

Published: October 9, 2020


Vulnerability identifier: #VU47484
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-352
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress
Software vendor:
The WP Ninjas

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website, such as install arbitrary plugins.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected website.

Exploitation example:

http://[host]/wp-admin/admin-ajax.php?action=nf_services_install&plugin=<PLUGIN_NAME>&install_path=<INSTALL_PATH>

Remediation

Install updates from vendor's website.

External links