9.8

CVE-2023-0714

Metform Elementor Contact Form Builder <= 3.2.4 - Unauthenticated Double-Extension Arbitrary File Upload

The Metform Elementor Contact Form Builder for WordPress is vulnerable to Arbitrary File Upload due to insufficient file type validation in versions up to, and including, 3.2.4. This allows unauthenticated visitors to perform a "double extension" attack and upload files containing a malicious extension but ending with a benign extension, which may make remote code execution possible in some configurations.
Mögliche Gegenmaßnahme
MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor: Update to version 3.3.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor
Version *-3.2.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WpmetMetform Elementor Contact Form Builder SwPlatformwordpress Version < 3.3.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 13.92% 0.941
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security@wordfence.com 8.1 2.2 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-434 Unrestricted Upload of File with Dangerous Type

The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.