HomeSEOWordPress Contact Kind Entries Plugin Vulnerability Impacts 70K Web sites

WordPress Contact Kind Entries Plugin Vulnerability Impacts 70K Web sites


A vulnerability advisory was issued for a WordPress plugin that saves contact kind submissions. The flaw permits unauthenticated attackers to delete information, launch a denial of service assault, or carry out distant code execution. The vulnerability was given a severity score of 9.8 on a scale of 1 to 10, indicating the seriousness of the problem.

Database for Contact Kind 7, WPForms, Elementor Kinds Plugin

The Database for Contact Kind 7, WPForms, Elementor Kinds, additionally apparently referred to as the Contact Kind Entries Plugin, saves contact kind entries into the WordPress database. It permits customers to view contact kind submissions, search them, mark them as learn or unread, export them, and carry out different capabilities. The plugin has over 70,000 installations.

The plugin is susceptible to PHP Object Injection by an unauthenticated attacker, which implies that an attacker doesn’t have to log in to the web site to launch the assault.

A PHP object is an information construction in PHP. PHP objects might be changed into a sequence of characters (serialized) with the intention to retailer them after which deserialized (turned again into an object). The flaw that provides rise to this vulnerability is that the plugin permits an unauthenticated attacker to inject an untrusted PHP object.

If the WordPress web site additionally has the Contact Kind 7 plugin put in, then it may set off a POP chain throughout deserialization.

In keeping with the Wordfence advisory:

“This makes it doable for unauthenticated attackers to inject a PHP Object. The extra presence of a POP chain within the Contact Kind 7 plugin, which is probably going for use alongside, permits attackers to delete arbitrary information, resulting in a denial of service or distant code execution when the wp-config.php file is deleted.”

All variations of the plugin as much as and together with 1.4.3 are susceptible. Customers are suggested to replace their plugin to the most recent model, which as of this date is model 1.4.5.

Featured Picture by Shutterstock/tavizta

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments