Rojak WP
  • Home
  • Sources
    • BobWP
    • Chris Lema
    • Colorlib
    • Winning WP
    • WP Beginner
    • WP Explorer
    • WP Lift
    • WP Sessions
    • WP Tavern
    • WP-Com
    • WP-Org
    • WPEka
    • WPMU Dev
    • OnlineRockersHub
  • Top
  • Themes
  • Plugins
  • WooCommerce
  • Free Stuff
  • Popular Tags
    • WordPress
    • Website
    • Templates
    • Tavern
    • SitePoint
  • Videos
No Result
View All Result
  • Home
  • Sources
    • BobWP
    • Chris Lema
    • Colorlib
    • Winning WP
    • WP Beginner
    • WP Explorer
    • WP Lift
    • WP Sessions
    • WP Tavern
    • WP-Com
    • WP-Org
    • WPEka
    • WPMU Dev
    • OnlineRockersHub
  • Top
  • Themes
  • Plugins
  • WooCommerce
  • Free Stuff
  • Popular Tags
    • WordPress
    • Website
    • Templates
    • Tavern
    • SitePoint
  • Videos
No Result
View All Result
Rojak WP
No Result
View All Result

Contact Form 7 Version 5.3.2 Patches Critical Vulnerability, Immediate Update Recommended – WordPress Tavern

December 18, 2020
in WP Tavern
, Contact Form 7 Version 5.3.2 Patches Critical Vulnerability, Immediate Update Recommended – WordPress Tavern, Rojak WP
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter

Contact Form 7 has patched a critical file upload vulnerability in version 5.3.2, released today by plugin author Takayuki Miyoshi. The plugin is installed on more than five million WordPress sites.

“An unrestricted file upload vulnerability has been found in Contact Form 7 5.3.1 and older versions,” Miyoshi said. “Utilizing this vulnerability, a form submitter can bypass Contact Form 7’s filename sanitization, and upload a file which can be executed as a script file on the host server.”

The vulnerability was discovered by Jinson Varghese Behanan from Astra Security on December 16, 2020, and Miyoshi released a fix less than 24 hours later. Behanan highlighted a few ways this vulnerability might be exploited:

  1. Possible to upload a web shell and inject malicious scripts
  2. Complete takeover of the website and server if there is no containerization between websites on the same server
  3. Defacing the website

Astra Security plans to publish more details on the vulnerability in two weeks after the plugin’s user base has had more time to update to the patched version.

Version 5.3.2 removes control, separator, and other types of special characters from the filename to fix the unrestricted file upload vulnerability. At the time of publishing, more than a million Contact Form 7 updates have been downloaded today. Approximately 20% of the plugin’s user base is protected from the vulnerability. Now that it has been patched and published, Contact Form 7 users who do not update will be more at risk of having the vulnerability exploited.

Like this:

Like Loading…

Credited Source

Tags: ContactCriticalFormPatchesrecommendedTavernUpdateVersionVulnerabilityWordPress
Previous Post

Help Steer the Future of WordPress via the FSE Outreach Program – WordPress Tavern

Next Post

Top Video Header WordPress Themes to Make an Amazing First Impression

Next Post
, Contact Form 7 Version 5.3.2 Patches Critical Vulnerability, Immediate Update Recommended – WordPress Tavern, Rojak WP

Top Video Header WordPress Themes to Make an Amazing First Impression

No Result
View All Result

Ads

Categories

  • Best Seller WP Themes
  • BobWP
  • Chris Lema
  • Code In WP
  • Colorlib
  • Site Point
  • Winning WP
  • WP Beginner
  • WP Explorer
  • WP Lift
  • WP Tavern
  • WP-Com
  • WP-Org
  • WPEka
  • WPMU Dev

Rojak WP © 2020 | rojakwp[at]gmail.com

No Result
View All Result
  • Home
  • Sources
    • BobWP
    • Chris Lema
    • Colorlib
    • Winning WP
    • WP Beginner
    • WP Explorer
    • WP Lift
    • WP Sessions
    • WP Tavern
    • WP-Com
    • WP-Org
    • WPEka
    • WPMU Dev
    • OnlineRockersHub
  • Top
  • Themes
  • Plugins
  • WooCommerce
  • Free Stuff
  • Popular Tags
    • WordPress
    • Website
    • Templates
    • Tavern
    • SitePoint
  • Videos

Rojak WP © 2020 | rojakwp[at]gmail.com