# Dork: inurl:"/wp-content/plugins/123ContactForm"
#Author: Rutvik Jaini
#references: https://wpscan.com/vulnerability/ce716e4f-60f8-42e3-8891-a38e7948b970
https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html
DescriptionThe cfp-connect AJAX call uses user input controlled data to
perform the signature verification, attackers could craft these values
($message, $signature, $cf_pub_key) to bypass the validation mechanisms and
inject their own public_key into the database.
POC: