First published: Thu Jan 11 2024(Updated: )
The Contact Form 7 – Dynamic Text Extension plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the CF7_get_custom_field and CF7_get_current_user shortcodes due to missing validation on a user controlled key. This makes it possible for authenticated attackers with contributor access or higher to access arbitrary metadata of any post type, referencing the post by id and the meta by key.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rocklobster Contact Form 7 | <=4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6630 has been classified as a medium severity vulnerability.
To fix CVE-2023-6630, update the Contact Form 7 – Dynamic Text Extension plugin to version 4.1.1 or later.
CVE-2023-6630 affects all versions of the Contact Form 7 – Dynamic Text Extension plugin up to and including 4.1.0.
CVE-2023-6630 is classified as an Insecure Direct Object Reference vulnerability.
Yes, CVE-2023-6630 can be exploited by users due to missing validation on user-controlled keys.