Vulnerability Description
In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ninjaforms | Ninja Forms | < 3.4.34.1 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89ExploitThird Party Advisory
- https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vuThird Party Advisory
- https://wpscan.com/vulnerability/dfa32afa-c6de-4237-a9f2-709843dcda89ExploitThird Party Advisory
- https://www.wordfence.com/blog/2021/02/one-million-sites-affected-four-severe-vuThird Party Advisory
FAQ
What is CVE-2021-24164?
CVE-2021-24164 is a vulnerability with a CVSS score of 4.3 (MEDIUM). In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to est...
How severe is CVE-2021-24164?
CVE-2021-24164 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24164?
Check the references section above for vendor advisories and patch information. Affected products include: Ninjaforms Ninja Forms.