Multiple high-severity vulnerabilities have been found in Ninja Forms, a widely-used forms builder plugin for WordPress with over 900,000 active installations. The vulnerabilities, discovered by Patchstack security researcher Rafie Muhammad, include a POST-based reflected Cross-Site Scripting (XSS) flaw that could be exploited by unauthorized users to steal sensitive information or execute malicious code on affected WordPress sites.
Additionally, broken access control issues on the form submissions export feature enable lower-level users to access all Ninja Forms submissions, disregarding their intended privileges. The plugin’s developer, Saturday Drive, has released version 3.6.26 to address the issues, making it crucial for users to update their plugins to mitigate these risks and protect their websites.
The vulnerabilities identified in Ninja Forms, a popular WordPress forms builder, pose significant security threats, potentially allowing unauthorized users to execute malicious code or access sensitive data. The first vulnerability, a POST-based reflected Cross-Site Scripting (XSS) flaw, was assigned CVE-2023-37979 and has been resolved in version 3.6.26 of the plugin. The second and third vulnerabilities, related to broken access control, were assigned CVE-2023-38393 and CVE-2023-38386 respectively, and have also been fixed in the latest version.
Users must promptly update their Ninja Forms plugins to at least version 3.6.26 to safeguard their websites from potential exploitation and ensure compliance with permission and access control checks.
Patchstack security researcher Rafie Muhammad’s advisory highlights the critical nature of the vulnerabilities discovered in Ninja Forms. These flaws could allow unauthorized users to gain access to sensitive information or inject malicious code, potentially compromising WordPress sites with the plugin installed.
In response to the reported issues, Saturday Drive, the developer of Ninja Forms, swiftly released version 3.6.26, which includes necessary fixes to mitigate these security risks. Users are advised to update their plugins immediately to ensure their websites are protected from potential cyberattacks and unauthorized access.