Description
Cross-site request forgery (CSRF) vulnerability in the Encrypted Contact Form plugin before 1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the iframe_url parameter in an Update Page action in the conformconf page to wp-admin/options-general.php.
Exploits (1)
References (9)
Core 9
Core References
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/37264/
Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/7992
Patch, Third Party Advisory x_refsource_confirm
https://wordpress.org/plugins/encrypted-contact-form/changelog/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/73433
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/132209/WordPress-Encrypted-Contact-Form-1.0.4-CSRF-XSS.html
Third Party Advisory vendor-advisory
x_refsource_hp
http://marc.info/?l=bugtraq&m=142607790919348&w=2
Exploit, Mailing List, Third Party Advisory, VDB Entry mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/May/63
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/535699/100/0/threaded
Release Notes x_refsource_confirm
https://plugins.trac.wordpress.org/changeset/1125443/
Scores
EPSS
0.0135
EPSS Percentile
80.2%
Details
CWE
CWE-352
Status
published
Products (1)
everybit/encrypted_contact_form
< 1.1
Published
Jun 09, 2015
Tracked Since
Feb 18, 2026