The Contact Form 7 Email Add on plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the cf7_email_add_on_add_admin_template() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php files can be uploaded and included.
History

Tue, 26 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:krishaweb:contact_form_7_email_add_on:*:*:*:*:*:wordpress:*:*

Thu, 21 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Krishaweb
Krishaweb contact Form 7 Email Add On
CPEs cpe:2.3:a:krishaweb:contact_form_7_email_add_on:*:*:*:*:*:*:*:*
Vendors & Products Krishaweb
Krishaweb contact Form 7 Email Add On
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Nov 2024 02:45:00 +0000

Type Values Removed Values Added
Description The Contact Form 7 Email Add on plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the cf7_email_add_on_add_admin_template() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php files can be uploaded and included.
Title Contact Form 7 Email Add on <= 1.9 - Authenticated (Contributor+) Local File Inclusion
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-11-21T14:49:48.042Z

Reserved: 2024-11-05T19:10:24.159Z

Link: CVE-2024-10898

cve-icon Vulnrichment

Updated: 2024-11-21T14:49:41.889Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-21T11:15:23.610

Modified: 2024-11-26T20:32:20.217

Link: CVE-2024-10898

cve-icon Redhat

No data.