First published: Wed Apr 16 2025(Updated: )
The Contact Form by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.29. This is due to missing or incorrect nonce validation on a saveAsCopy function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Supsystic Contact Form | <=1.7.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13452 is considered a critical vulnerability due to its potential for allowing unauthenticated attackers to exploit the system.
To fix CVE-2024-13452, update the Supsystic Contact Form plugin to version 1.7.30 or later, which includes the necessary security enhancements.
CVE-2024-13452 affects all users of the Supsystic Contact Form plugin for WordPress up to and including version 1.7.29.
CVE-2024-13452 is classified as a Cross-Site Request Forgery (CSRF) vulnerability.
The consequences of CVE-2024-13452 include the potential for unauthorized changes to be made to the contact form, compromising the site's integrity.