Description
WordPress Plugin CP Contact Form with PayPal is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery and SQL injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to perform certain administrative actions and gain unauthorized access to the affected application or to compromise the application, access or modify data or to exploit vulnerabilities in the underlying database. WordPress Plugin CP Contact Form with PayPal version 1.1.5 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.1.6 or latest
References
Related Vulnerabilities
WordPress Plugin WooCommerce-Store Toolkit Privilege Escalation (1.5.6)
Apache 2.x version older than 2.0.61
ReviveAdserver Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-9407)
WordPress Plugin Slideshow Pro 'upload.php' Arbitrary File Upload (2.1)
Riot.js Resource Management Errors Vulnerability (CVE-2016-10527)