First published: Sat Jun 03 2023(Updated: )
The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
vcita Contact Form and Calls To Action by vcita WordPress | <=2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2303 refers to a vulnerability in the Contact Form and Calls To Action by vcita plugin for WordPress, allowing unauthenticated attackers to perform Cross-Site Request Forgery.
CVE-2023-2303 has a severity level of medium with a severity value of 6.1.
CVE-2023-2303 affects versions up to and including 2.6.4 of the Contact Form and Calls To Action by vcita plugin for WordPress by allowing unauthenticated attackers to modify the plugin's functionality through Cross-Site Request Forgery.
To fix CVE-2023-2303, it is recommended to update to a version of the Contact Form and Calls To Action by vcita plugin for WordPress that includes nonce validation in the vcita-callback.php file.
More information about CVE-2023-2303 can be found on the WordPress plugins trac, Wordfence threat intelligence, and a blog post by Jon H.