MEDIUM (5.4)
    Plugin

    Cross-Site Request Forgery in Advanced Contact Form 7 DB Plugin

    Published Date: 4/8/2026
    CVE ID: CVE-2026-0811

    Summary

    The Advanced Contact Form 7 DB plugin is susceptible to Cross-Site Request Forgery (CSRF) vulnerabilities in versions up to and including 2.0.9. This flaw allows unauthenticated attackers to potentially manipulate form entries by deceiving a site administrator into executing specific actions.

    Vulnerability Details

    The vulnerability in the Advanced Contact Form 7 DB plugin arises from the lack of proper nonce validation in the 'vsz_cf7_save_setting_callback' function. Nonce validation is critical for ensuring that requests are intended and authorized, thereby mitigating CSRF attacks. Without this safeguard, attackers can craft malicious requests that appear legitimate, potentially leading to unauthorized actions such as deleting form entries. Such actions are executed when a site administrator, while authenticated, is tricked into clicking a malicious link. This vulnerability highlights the importance of protecting sensitive functions with proper CSRF defenses. Although the severity is unspecified, the potential for exploitation necessitates prompt attention.

    Recommendations

    To mitigate this vulnerability, developers should implement nonce checks on critical functions, ensuring that every action request is validated against a nonce. Administrators should avoid clicking on unknown or suspicious links while logged into their WordPress accounts to prevent potential CSRF attacks.

    Available Fixes

    Last Updated: 4/10/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More