CVE-2023-6788

The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.1. This is due to missing or incorrect nonce validation on the contents function. This makes it possible for unauthenticated attackers to update the options "mf_hubsopt_token", "mf_hubsopt_refresh_token", "mf_hubsopt_token_type", and "mf_hubsopt_expires_in" via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This would allow an attacker to connect their own Hubspot account to a victim site's metform to obtain leads and contacts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/metform/trunk/core/integrations/crm/hubspot/loader.php#L87 - Patch () https://plugins.trac.wordpress.org/browser/metform/trunk/core/integrations/crm/hubspot/loader.php#L87 - Patch
References () https://plugins.trac.wordpress.org/changeset/3011284/metform/trunk/core/integrations/crm/hubspot/loader.php - Patch () https://plugins.trac.wordpress.org/changeset/3011284/metform/trunk/core/integrations/crm/hubspot/loader.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/30fd2425-ee48-4777-91c1-03906d63793a?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/30fd2425-ee48-4777-91c1-03906d63793a?source=cve - Third Party Advisory

11 Jan 2024, 23:33

Type Values Removed Values Added
CPE cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/metform/trunk/core/integrations/crm/hubspot/loader.php#L87 - () https://plugins.trac.wordpress.org/browser/metform/trunk/core/integrations/crm/hubspot/loader.php#L87 - Patch
References () https://plugins.trac.wordpress.org/changeset/3011284/metform/trunk/core/integrations/crm/hubspot/loader.php - () https://plugins.trac.wordpress.org/changeset/3011284/metform/trunk/core/integrations/crm/hubspot/loader.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/30fd2425-ee48-4777-91c1-03906d63793a?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/30fd2425-ee48-4777-91c1-03906d63793a?source=cve - Third Party Advisory
CWE CWE-352
First Time Wpmet
Wpmet metform Elementor Contact Form Builder

09 Jan 2024, 14:01

Type Values Removed Values Added
Summary
  • (es) Metform Elementor Contact Form Builder complemento para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.8.1 incluida. Esto se debe a una validación nonce faltante o incorrecta en la función de contents. Esto hace posible que atacantes no autenticados actualicen las opciones "mf_hubsopt_token", "mf_hubsopt_refresh_token", "mf_hubsopt_token_type" y "mf_hubsopt_expires_in" a través de una solicitud falsificada, siempre que puedan engañar a un administrador del sitio para que realice una acción como hacer clic en un enlace. Esto permitiría a un atacante conectar su propia cuenta de Hubspot al metform del sitio víctima para obtener clientes potenciales y contactos.

09 Jan 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-09 04:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6788

Mitre link : CVE-2023-6788

CVE.ORG link : CVE-2023-6788


JSON object : View

Products Affected

wpmet

  • metform_elementor_contact_form_builder
CWE
CWE-352

Cross-Site Request Forgery (CSRF)