Impact
The WP Quick Contact Us plugin contains a cross‑site request forgery flaw caused by the absence of nonce validation on the settings update routine. An attacker can cause a site administrator to change the plugin’s configuration by luring them to click a crafted link, potentially disabling the contact form or redirecting submissions to malicious destinations.
Affected Systems
Dmitritechs WP Quick Contact Us is affected in all releases up to and including version 1.0. Any WordPress site running these versions is at risk.
Risk and Exploitability
The vulnerability carries a CVSS score of 4.3 and an EPSS score of less than 1 %. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires the attacker to trick an authenticated administrator into clicking a link; thus the attack vector is user interaction only, which reduces the overall risk profile.
OpenCVE Enrichment