Vulnerability Description
The The WPB Popup for Contact Form 7 – Showing The Contact Form 7 Popup on Button Click – CF7 Popup plugin for WordPress is vulnerable to arbitrary shortcode execution via wpb_pcf_fire_contact_form AJAX action in all versions up to, and including, 1.7.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpbean | Wpb Popup For Contact Form 7 | < 1.7.6 |
Related Weaknesses (CWE)
References
- https://gist.github.com/wpbean/1a5abfea883621b4e150eab1362a420fProduct
- https://plugins.trac.wordpress.org/browser/wpb-popup-for-contact-form-7/tags/1.7Product
- https://plugins.trac.wordpress.org/changeset/3188864/Patch
- https://wordpress.org/plugins/wpb-popup-for-contact-form-7/#developersProduct
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a7faa800-3b29-4b79-8b9Third Party Advisory
FAQ
What is CVE-2024-11038?
CVE-2024-11038 is a vulnerability with a CVSS score of 7.3 (HIGH). The The WPB Popup for Contact Form 7 – Showing The Contact Form 7 Popup on Button Click – CF7 Popup plugin for WordPress is vulnerable to arbitrary shortcode execution via wpb_pcf_fire_contact_form AJ...
How severe is CVE-2024-11038?
CVE-2024-11038 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-11038?
Check the references section above for vendor advisories and patch information. Affected products include: Wpbean Wpb Popup For Contact Form 7.