
Cloud Vulnerability DB
A community-led vulnerabilities database
The WordPress Contact Forms by Cimatti plugin was found to contain a Cross-Site Request Forgery (CSRF) vulnerability, identified as CVE-2023-2563. This security flaw affects versions up to and including 1.5.7 of the plugin, specifically in the _accua_forms_form_edit_action functionality (Wordfence Intel).
The vulnerability has been assigned a CVSS v3.1 base score of 4.3, indicating a medium severity level. The attack vector is characterized as Network (N), with low attack complexity (L), requiring no privileges (PR), and user interaction (UI) is required. The scope is unchanged (U), with potential impact limited to integrity (I:L), while confidentiality (C:N) and availability (A:N) are not affected (NVD).
The vulnerability could allow attackers to perform unauthorized actions through CSRF attacks, potentially manipulating form settings or content when a legitimate administrator accesses malicious content while authenticated (Wordfence Intel).
Website administrators running the affected versions of the WordPress Contact Forms by Cimatti plugin should update to the latest version that includes patches for this vulnerability (Wordfence Intel).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."