All the vulnerabilites related to Unknown - Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress
cve-2021-24164
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.4.34.1 < 3.4.34.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.4.34.1", "status": "affected", "version": "3.4.34.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chloe Chamberland" } ], "descriptions": [ { "lang": "en", "value": "In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:43", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ninja Forms \u003c 3.4.34.1 - Authenticated OAuth Connection Key Disclosure", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24164", "STATE": "PUBLIC", "TITLE": "Ninja Forms \u003c 3.4.34.1 - Authenticated OAuth Connection Key Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.4.34.1", "version_value": "3.4.34.1" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Chloe Chamberland" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "name": "https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24164", "datePublished": "2021-04-05T18:27:43", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24165
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.4.34 < 3.4.34 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.4.34", "status": "affected", "version": "3.4.34", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chloe Chamberland" } ], "descriptions": [ { "lang": "en", "value": "In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:43", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ninja Forms \u003c 3.4.34 - Administrator Open Redirect", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24165", "STATE": "PUBLIC", "TITLE": "Ninja Forms \u003c 3.4.34 - Administrator Open Redirect" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.4.34", "version_value": "3.4.34" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Chloe Chamberland" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "name": "https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/6147acf5-e43f-47e6-ab56-c9c8be584818" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24165", "datePublished": "2021-04-05T18:27:43", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24166
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
The wp_ajax_nf_oauth_disconnect from the Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 had no nonce protection making it possible for attackers to craft a request to disconnect a site's OAuth connection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.4.34 < 3.4.34 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.4.34", "status": "affected", "version": "3.4.34", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chloe Chamberland" } ], "descriptions": [ { "lang": "en", "value": "The wp_ajax_nf_oauth_disconnect from the Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 had no nonce protection making it possible for attackers to craft a request to disconnect a site\u0027s OAuth connection." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:43", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ninja Forms \u003c 3.4.34 - CSRF to OAuth Service Disconnection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24166", "STATE": "PUBLIC", "TITLE": "Ninja Forms \u003c 3.4.34 - CSRF to OAuth Service Disconnection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.4.34", "version_value": "3.4.34" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Chloe Chamberland" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wp_ajax_nf_oauth_disconnect from the Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 had no nonce protection making it possible for attackers to craft a request to disconnect a site\u0027s OAuth connection." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" }, { "name": "https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/b531fb65-a8ff-4150-a9a1-2a62a3c00bd6" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24166", "datePublished": "2021-04-05T18:27:43", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24163
Vulnerability from cvelistv5
Published
2021-04-05 18:27
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.4.34 < 3.4.34 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.4.34", "status": "affected", "version": "3.4.34", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chloe Chamberland" } ], "descriptions": [ { "lang": "en", "value": "The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-05T18:27:43", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ninja Forms \u003c 3.4.34 - Authenticated SendWP Plugin Installation and Client Secret Key Disclosure", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24163", "STATE": "PUBLIC", "TITLE": "Ninja Forms \u003c 3.4.34 - Authenticated SendWP Plugin Installation and Client Secret Key Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.4.34", "version_value": "3.4.34" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Chloe Chamberland" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2" }, { "name": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/", "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24163", "datePublished": "2021-04-05T18:27:43", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25056
Vulnerability from cvelistv5
Published
2022-07-04 13:05
Modified
2024-08-03 19:49
Severity ?
EPSS score ?
Summary
The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitise and escape field labels, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.6.10 < 3.6.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:49:14.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.6.10", "status": "affected", "version": "3.6.10", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Muhammad Adel" } ], "descriptions": [ { "lang": "en", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitise and escape field labels, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-04T13:05:21", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de" } ], "source": { "discovery": "EXTERNAL" }, "title": "Ninja Forms \u003c 3.6.10 - Admin+ Stored Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-25056", "STATE": "PUBLIC", "TITLE": "Ninja Forms \u003c 3.6.10 - Admin+ Stored Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.6.10", "version_value": "3.6.10" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Muhammad Adel" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitise and escape field labels, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/795acab2-f621-4662-834b-ebb6205ef7de" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-25056", "datePublished": "2022-07-04T13:05:21", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:49:14.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24889
Vulnerability from cvelistv5
Published
2021-11-29 08:25
Modified
2024-08-03 19:49
Severity ?
EPSS score ?
Summary
The Ninja Forms Contact Form WordPress plugin before 3.6.4 does not escape keys of the fields POST parameter, which could allow high privilege users to perform SQL injections attacks
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.6.4 < 3.6.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:49:13.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.6.4", "status": "affected", "version": "3.6.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "JrXnm" } ], "descriptions": [ { "lang": "en", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.4 does not escape keys of the fields POST parameter, which could allow high privilege users to perform SQL injections attacks" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-29T08:25:45", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495" } ], "source": { "discovery": "EXTERNAL" }, "title": "Ninja Forms \u003c 3.6.4 - Admin+ SQL Injection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24889", "STATE": "PUBLIC", "TITLE": "Ninja Forms \u003c 3.6.4 - Admin+ SQL Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.6.4", "version_value": "3.6.4" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "JrXnm" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.4 does not escape keys of the fields POST parameter, which could allow high privilege users to perform SQL injections attacks" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/55008a42-eb56-436c-bce0-10ee616d0495" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24889", "datePublished": "2021-11-29T08:25:45", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:49:13.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25066
Vulnerability from cvelistv5
Published
2022-07-04 13:05
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitize and escape some imported data, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.6.10 < 3.6.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:09.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.6.10", "status": "affected", "version": "3.6.10", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Muhammad Adel" } ], "descriptions": [ { "lang": "en", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitize and escape some imported data, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-04T13:05:27", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d" } ], "source": { "discovery": "EXTERNAL" }, "title": "Ninja Forms \u003c 3.6.10 - Admin+ Stored Cross-Site Scripting via Import", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-25066", "STATE": "PUBLIC", "TITLE": "Ninja Forms \u003c 3.6.10 - Admin+ Stored Cross-Site Scripting via Import" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.6.10", "version_value": "3.6.10" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Muhammad Adel" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitize and escape some imported data, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/323d5fd0-abe8-44ef-9127-eea6fd4f3f3d" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-25066", "datePublished": "2022-07-04T13:05:27", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:56:09.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2903
Vulnerability from cvelistv5
Published
2022-09-26 12:35
Modified
2024-08-03 00:53
Severity ?
EPSS score ?
Summary
The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.6.13 < 3.6.13 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:53:00.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.6.13", "status": "affected", "version": "3.6.13", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alessio Santoru" } ], "descriptions": [ { "lang": "en", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-26T12:35:34", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864" } ], "source": { "discovery": "EXTERNAL" }, "title": "NinjaForms \u003c 3.6.13 - Admin+ PHP Objection Injection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2903", "STATE": "PUBLIC", "TITLE": "NinjaForms \u003c 3.6.13 - Admin+ PHP Objection Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.6.13", "version_value": "3.6.13" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Alessio Santoru" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2903", "datePublished": "2022-09-26T12:35:34", "dateReserved": "2022-08-19T00:00:00", "dateUpdated": "2024-08-03T00:53:00.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24381
Vulnerability from cvelistv5
Published
2021-10-25 13:20
Modified
2024-08-03 19:28
Severity ?
EPSS score ?
Summary
The Ninja Forms Contact Form WordPress plugin before 3.5.8.2 does not sanitise and escape the custom class name of the form field created, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Unknown | Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress |
Version: 3.5.8.2 < 3.5.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:28:23.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "3.5.8.2", "status": "affected", "version": "3.5.8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Rodel Plasabas" } ], "descriptions": [ { "lang": "en", "value": "The Ninja Forms Contact Form WordPress plugin before 3.5.8.2 does not sanitise and escape the custom class name of the form field created, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T13:20:32", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d" } ], "source": { "discovery": "EXTERNAL" }, "title": "NinjaForms \u003c 3.5.8.2 - Admin+ Stored Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24381", "STATE": "PUBLIC", "TITLE": "NinjaForms \u003c 3.5.8.2 - Admin+ Stored Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.5.8.2", "version_value": "3.5.8.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Rodel Plasabas" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Ninja Forms Contact Form WordPress plugin before 3.5.8.2 does not sanitise and escape the custom class name of the form field created, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/e383fae6-e0da-4aba-bb62-adf51c01bf8d" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24381", "datePublished": "2021-10-25T13:20:32", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:28:23.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }