First published: Sat Jan 27 2024(Updated: )
The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.15.21. This is due to missing or incorrect nonce validation on the 'execute' function. This makes it possible for unauthenticated attackers to execute arbitrary methods in the 'BoosterController' class via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
10Web Form Maker | <=1.15.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0667 has been classified as a high severity vulnerability due to its potential for Cross-Site Request Forgery.
To fix CVE-2024-0667, update the Form Maker plugin to the latest version that includes proper nonce validation.
CVE-2024-0667 affects all versions of the Form Maker plugin for WordPress up to and including 1.15.21.
CVE-2024-0667 is a Cross-Site Request Forgery vulnerability that arises from insufficient nonce validation.
Yes, CVE-2024-0667 can allow attackers to perform unauthorized actions on behalf of users due to the CSRF vulnerability.