The Metform WordPress plugin is vulnerable to sensitive information disclosure due to improper access control in the ~/core/forms/action.php file which can be exploited by an unauthenticated attacker to view all API keys and secrets of integrated third-party APIs like that of PayPal, Stripe, Mailchimp, Hubspot, HelpScout, reCAPTCHA and many more, in versions up to and including 2.1.3.
References
Link | Resource |
---|---|
https://gist.github.com/Xib3rR4dAr/6e6c6e5fa1f8818058c7f03de1eda6bf | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2711944/metform/trunk/core/forms/action.php | Patch Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/04a46249-b5b2-4082-b520-cdc4a1370bb1?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-05-10T19:30:12
Updated: 2023-10-20T15:05:57.036Z
Reserved: 2022-04-23T00:00:00
Link: CVE-2022-1442
JSON object: View
NVD Information
Status : Modified
Published: 2022-05-10T20:15:08.473
Modified: 2023-11-07T03:41:57.117
Link: CVE-2022-1442
JSON object: View
Redhat Information
No data.
CWE