The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Sat, 21 Dec 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-06-03T04:35:13.759Z
Updated: 2024-12-20T23:57:56.854Z
Reserved: 2023-04-26T12:33:54.006Z
Link: CVE-2023-2303
Vulnrichment
Updated: 2024-08-02T06:19:14.594Z
NVD
Status : Modified
Published: 2023-06-03T05:15:09.527
Modified: 2024-11-21T07:58:20.807
Link: CVE-2023-2303
Redhat
No data.