First published: Fri Oct 11 2024(Updated: )
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NinjaTeam Multi Step for Contact Form allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through 2.7.7.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
NinjaTeam Multi Step for Contact Form 7 | <2.7.8 |
Update to 2.7.8 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47331 has a critical severity level due to its potential for SQL Injection attacks.
To fix CVE-2024-47331, update the NinjaTeam Multi Step for Contact Form plugin to version 2.7.8 or later.
CVE-2024-47331 affects NinjaTeam Multi Step for Contact Form versions from n/a up to 2.7.7.
CVE-2024-47331 enables SQL Injection attacks, allowing attackers to manipulate database queries.
Yes, a patch is available through updating to NinjaTeam Multi Step for Contact Form version 2.7.8 or higher.