8.8
CVSSv3

CVE-2021-24704

Published: 28/02/2022 Updated: 07/03/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In the Orange Form WordPress plugin up to and including 1.0, the process_bulk_action() function in "admin/orange-form-email.php" performs an unprepared SQL query with an unsanitized parameter ($id). Only admin can access the page that invokes the function, but because of lack of CSRF protection, it is actually exploitable and could allow malicious users to make a logged in admin delete arbitrary posts for example

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

orange-form project orange-form