Discover the security vulnerability in WebDorado Contact Form plugin for WordPress pre-1.13.5. Learn about CSRF risks and local file inclusion, and find mitigation steps.
WebDorado Contact Form plugin for WordPress prior to version 1.13.5 is vulnerable to CSRF attacks through the action parameter in wp-admin/admin-ajax.php, leading to local file inclusion via directory traversal.
Understanding CVE-2019-11591
This CVE identifies a security vulnerability in the WebDorado Contact Form plugin for WordPress versions before 1.13.5.
What is CVE-2019-11591?
The vulnerability allows for CSRF attacks through the action parameter in wp-admin/admin-ajax.php, potentially resulting in local file inclusion via directory traversal due to unsanitized values.
The Impact of CVE-2019-11591
The vulnerability could be exploited by attackers to include local files through directory traversal, potentially leading to unauthorized access or data leakage.
Technical Details of CVE-2019-11591
The technical aspects of the CVE provide insight into the vulnerability and its implications.
Vulnerability Description
The issue arises from a discrepancy between the values of $_POST['action'] and $_GET['action'], with the latter being unsanitized, enabling CSRF attacks and local file inclusion.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited through the action parameter in wp-admin/admin-ajax.php, allowing attackers to manipulate unsanitized values to perform CSRF attacks and achieve local file inclusion.
Mitigation and Prevention
Protecting systems from CVE-2019-11591 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates