The Information Highway

The Information Highway

Font size: +
2 minutes reading time (372 words)

WordPress Ninja Forms plugin flaw lets hackers steal submitted data

Popular WordPress form-building plugin Ninja Forms contains three vulnerabilities that could allow attackers to achieve privilege escalation and steal user data.

Researchers at Patchstack discovered and disclosed the three vulnerabilities to the plugin's developer, Saturday Drive, on June 22nd, 2023, warning that it affects NinjaForms versions 3.6.25 and older.

The developers released version 3.6.26 on July 4th, 2023, to fix the vulnerabilities. However, WordPress.org stats show that only roughly half of all NinjaForms users have downloaded the latest release, leaving about 400,000 sites vulnerable to attacks. 


The vulnerabilities

The first vulnerability discovered by Patchstack is 2CVE-2023-37979, a POST-based reflected XSS (cross-site scripting) flaw that allows unauthenticated users to escalate their privileges and steal information by tricking privileged users into visiting a specially-crafted webpage.

The second and third problems, tracked as CVE-2023-38393 and CVE-2023-38386, respectively, are broken access control issues on the plugin's form submissions export feature, allowing Subscribers and Contributors to export all of the data that users have submitted on the impacted WordPress site.

Although the issues are rated as high-severity, the CVE-2023-38393 is particularly dangerous because a required Subscriber role user is easy to meet.

Any site that supports membership and user registrations would be susceptible to massive data breach incidents due to that flaw if they use a vulnerable Ninja Forms plugin version. 

The processing function that contains CVE-2023-38393
(Patchstack)


The patches applied by the vendor in version 3.6.26 include adding permission checks for the broken access control issues and function access restrictions that prevent triggering the identified XSS.

Publicly reporting the above flaws was delayed by over three weeks to prevent drawing the attention of hackers to the flaws while allowing Ninja Form users to patch. However, there's still a significant number who haven't at this time.

Patchstack's coverage contains detailed technical information about the three flaws, so exploiting them should be trivial for knowledgeable threat actors.

That said, all website admins who use the Ninja Forms plugin are recommended to update to version 3.6.26 or later as soon as possible. If that is not possible, admins should disable the plugin from their sites until they can apply the patch.

Hackers steal Signal, WhatsApp user data with fake...
Windows 10 KB5028244 update released with 19 fixes...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Monday, 23 December 2024

Captcha Image

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023