Contact Form 7 Database Addon <= 1.2.5.3 - SQL Injection
The Contact Form 7 Database Addon plugin for WordPress is vulnerable to SQL Injection in versions up to, and including 1.2.5.3, that makes it possible for attackers to append arbitrary SQL queries into an existing query via the form_id parameter. This can be exploit by authenticated attackers to retrieve sensitive information from the database.
This vulnerability is a high severity with CVSS 8.8 SQL Injection issue affecting the Plugin Database Addon for Contact Form 7 – CFDB7. It affects Versions before 1.2.5.4 and is fixed in 1.2.5.4.
the tracked vulnerability is tracked for the Plugin Database Addon for Contact Form 7 – CFDB7 as high severity with CVSS 8.8. The affected range is Versions before 1.2.5.4. Update Database Addon for Contact Form 7 – CFDB7 to 1.2.5.4 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
contact-form-cfdb7
View on wordpress.org
|
| CVE | No linked CVE entry. |
| Patched Versions |
1.2.5.4
|
| Affected Versions |
Versions before 1.2.5.4
|
Related CVEs for Database Addon for Contact Form 7 – CFDB7
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
Contact Form 7 Database Addon <= 1.2.5.4 - CSV Injection
Contact Form 7 Database Addon <= 1.2.6.3 - CSV Injection
Contact Form 7 Database Addon – CFDB7 plugin <= 1.2.5.9 - Cross-Site Request Forgery
Contact Form 7 Database Addon <= 1.3.1 - Unauthenticated Stored Cross-Site Scripting via tmpD Parameter
Contact Form 7 Database Addon – CFDB7 <= 1.2.6.1 - Unauthenticated Stored Cross-Site Scripting
Contact Form 7 Database Addon – CFDB7 <= 1.2.6.8 - Unauthenticated Sensitive Information Exposure
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more