Popular WordPress form-building plugin Ninja Forms contains three vulnerabilities that could allow attackers to achieve privilege escalation and steal user data.
Researchers at Patchstack discovered and disclosed the three vulnerabilities to the plugin's developer, Saturday Drive, on June 22nd, 2023, warning that it affects NinjaForms versions 3.6.25 and older.
The developers released version 3.6.26 on July 4th, 2023, to fix the vulnerabilities. However, WordPress.org stats show that only roughly half of all NinjaForms users have downloaded the latest release, leaving about 400,000 sites vulnerable to attacks.
The vulnerabilities
The first vulnerability discovered by Patchstack is CVE-2023-37979, a POST-based reflected XSS (cross-site scripting) flaw that allows unauthenticated users to escalate their privileges and steal information by tricking privileged users into visiting a specially-crafted webpage.
The second and third problems, tracked as CVE-2023-38393 and CVE-2023-38386, respectively, are broken access control issues on the plugin's form submissions export feature, allowing Subscribers and Contributors to export all of the data that users have submitted on the impacted WordPress site.
Although the issues are rated as high-severity, the CVE-2023-38393 is particularly dangerous because a required Subscriber role user is easy to meet.
Any site that supports membership and user registrations would be susceptible to massive data breach incidents due to that flaw if they use a vulnerable Ninja Forms plugin version.
The patches applied by the vendor in version 3.6.26 include adding permission checks for the broken access control issues and function access restrictions that prevent triggering the identified XSS.
Publicly reporting the above flaws was delayed by over three weeks to prevent drawing the attention of hackers to the flaws while allowing Ninja Form users to patch. However, there's still a significant number who haven't at this time.
Patchstack's coverage contains detailed technical information about the three flaws, so exploiting them should be trivial for knowledgeable threat actors.
That said, all website admins who use the Ninja Forms plugin are recommended to update to version 3.6.26 or later as soon as possible. If that is not possible, admins should disable the plugin from their sites until they can apply the patch.
Comments
PluginVulns - 11 months ago
As we warned our customers a couple of weeks ago, the form submissions export vulnerability was incompletely fixed.
We are not sure how Patchstack missed that, but we let the developer know about that at the time. They haven't fixed it yet.
More details on that can be found at https://www.pluginvulnerabilities.com/2023/07/12/information-disclosure-vulnerability-in-ninja-forms-incompletely-fixed/
PluginVulns - 11 months ago
Also worth mentioning is that we had hackers probing for usage of Ninja Forms on one of our websites on July 13, 24, 25, 26. So it seems entirely possible that hackers already knew about this before Patchstack warned their customers.
PluginVulns - 11 months ago
There is also another vulnerability in the plugin that still hasn't been fixed, which we notified the developer of over a year ago: https://www.pluginvulnerabilities.com/2022/06/20/ninja-forms-merge-tags-functionality-is-still-vulnerable/ The developer recently said they will be fixing that, but so far they haven't.