
Cloud Vulnerability DB
A community-led vulnerabilities database
The Generate PDF using Contact Form 7 plugin for WordPress contains a Cross-Site Request Forgery (CSRF) vulnerability to Arbitrary File Upload in versions up to and including 4.0.6. The vulnerability was discovered and reported by Wordfence, with the CVE identifier CVE-2024-6316 being assigned on July 9, 2024 (NVD).
The vulnerability stems from missing nonce validation and missing file type validation in the 'wpcf7pdfdashboardhtml_page' function. This security flaw has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating a serious security risk (NVD).
The vulnerability allows unauthenticated attackers to upload arbitrary files on the affected site's server, which could potentially lead to remote code execution. The attack requires user interaction, specifically tricking a site administrator into performing an action such as clicking on a link (NVD).
Website administrators running the Generate PDF using Contact Form 7 plugin should immediately update to a version newer than 4.0.6 if available. Until an update can be applied, it is recommended to implement additional security measures and monitor for suspicious file upload attempts (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."