First published: Mon Apr 05 2021(Updated: )
The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ninja Forms | <3.4.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-24163 is high with a severity value of 8.8.
The affected software of CVE-2021-24163 is Ninja Forms version up to and excluding 3.4.34.
Low-level users, such as subscribers, can exploit CVE-2021-24163 by installing and activating the SendWP Ninja Forms Contact Form plugin without proper capability check or nonce protection.
Yes, patches have been released to fix CVE-2021-24163. It is recommended to update Ninja Forms to version 3.4.34 or higher.
You can find more information about CVE-2021-24163 at the following references: - [WPScan](https://wpscan.com/vulnerability/55fde9fa-f6cd-4546-bee8-4acc628251c2) - [Wordfence Blog](https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/)