First published: Sun Apr 09 2023(Updated: )
A vulnerability was found in BestWebSoft Contact Form 3.21. It has been classified as problematic. This affects the function cntctfrm_settings_page of the file contact_form.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.22 is able to address this issue. The identifier of the patch is 8398d96ff0fe45ec9267d7259961c2ef89ed8005. It is recommended to upgrade the affected component. The identifier VDB-225321 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bestwebsoft Contact Form | =3.21 | |
=3.21 |
https://github.com/wp-plugins/contact-form-plugin/commit/8398d96ff0fe45ec9267d7259961c2ef89ed8005
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-10010 is high.
The affected software for CVE-2012-10010 is BestWebSoft Contact Form version 3.21.
The vulnerability in CVE-2012-10010 is a cross-site request forgery (CSRF) vulnerability.
The attack for CVE-2012-10010 can be initiated remotely.
To fix CVE-2012-10010, upgrade to a version newer than 3.21 of BestWebSoft Contact Form.