The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'form-id' parameter in all versions up to, and including, 1.1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
History

Thu, 16 Jan 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Zestard
Zestard admin Side Data Storage For Contact Form 7
Weaknesses CWE-89
CPEs cpe:2.3:a:zestard:admin_side_data_storage_for_contact_form_7:*:*:*:*:*:wordpress:*:*
Vendors & Products Zestard
Zestard admin Side Data Storage For Contact Form 7

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-08T20:06:47.163Z

Reserved: 2024-02-22T18:32:11.074Z

Link: CVE-2024-1776

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:22.045Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-23T07:15:48.120

Modified: 2025-01-16T14:34:59.577

Link: CVE-2024-1776

cve-icon Redhat

No data.