First published: Thu Apr 20 2023(Updated: )
Form block is a wordpress plugin designed to make form creation easier. Versions prior to 1.0.2 are subject to a Cross-Site Request Forgery due to a missing nonce check. There is potential for a Cross Site Request Forgery for all form blocks, since it allows to send requests to the forms from any website without a user noticing. Users are advised to upgrade to version 1.0.2. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Epiph Form Block | <1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30616 is a vulnerability in the Form Block WordPress plugin that allows for Cross-Site Request Forgery (CSRF) attacks due to a missing nonce check.
CVE-2023-30616 could potentially allow attackers to perform unauthorized actions on behalf of a user, such as submitting malicious forms or changing form configurations.
The severity of CVE-2023-30616 is medium with a CVSS score of 6.5.
To mitigate CVE-2023-30616, it is recommended to update the Form Block plugin to version 1.0.2 or later, which includes a fix for the vulnerability.
You can find more information about CVE-2023-30616 on the GitHub security advisory page: [GitHub Advisory](https://github.com/epiphyt/form-block/security/advisories/GHSA-j4c2-7p87-q824)