inurl:"/wp-content/plugins/123ContactForm

GHDB-ID:

6979

Author:

Rutvik Jaini

Google Dork Description:

inurl:"/wp-content/plugins/123ContactForm

# Dork: inurl:"/wp-content/plugins/123ContactForm"

#Author: Rutvik Jaini

#references: https://wpscan.com/vulnerability/ce716e4f-60f8-42e3-8891-a38e7948b970

https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html

DescriptionThe cfp-connect AJAX call uses user input controlled data to
perform the signature verification, attackers could craft these values
($message, $signature, $cf_pub_key) to bypass the validation mechanisms and
inject their own public_key into the database.

POC: