Vulnerability Description
The The Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. This functionality is also vulnerable to Reflected Cross-Site Scripting. Version 1.7.0 patched the Reflected XSS issue, however, the arbitrary shortcode execution issue remains.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7
- https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7
- https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.6.9/admin/class-cf7
- https://plugins.trac.wordpress.org/browser/cf7-styler/tags/1.7.1/admin/class-cf7
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5d78ea71-5886-488e-a66
FAQ
What is CVE-2024-12419?
CVE-2024-12419 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The The Design for Contact Form 7 Style WordPress Plugin – CF7 WOW Styler plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.0. This is due t...
How severe is CVE-2024-12419?
CVE-2024-12419 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-12419?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.