Flaws in Ninja Forms WordPress Plugin Expose 1M Websites

Flaws in Ninja Forms WordPress Plugin Expose 1M WebsitesFour new security vulnerabilities in the Ninja Forms WordPress plugins were just reported. The Ninja Forms plugin enables users to create forms using drag and drop capabilities with ease, and it’s quite popular in the WordPress repository, as it is used by one million sites.

Affecting more than one million WordPress websites, the flaws could cause various malicious outcomes, such as redirection to arbitrary locations, intercepting all mail traffic, retrieving an authentication key, and disconnecting this key to trick a site admin to perform an action. Long story short, the vulnerabilities could be deployed in attacks aiming to take over WordPress sites and redirect their owners to malicious ones.

Ninja Forms WP Plugin Vulnerabilities

The first vulnerability is rated critical and is known as “Authenticated SendWP Plugin Installation and Client Secret Key Disclosure.” The bug stems from the plugin’s ability to install add-ons that could offer various services.

One of these services is SendWP, which is an email delivery and logging service intended to make mail handling with WordPress simpler. From the Ninja Form plugin’s Addon dashboard, it offers the ability to set up this service with just a few clicks. In order to provide this functionality, the plugin registers the AJAX action wp_ajax_ninja_forms_sendwp_remote_install,” Wordfence researchers explained.

It turns out that the AJAX action didn’t have nonce protection, enabling low-level users to install and activate the SendWP plugin and retrieve the client_secret key used to establish the SendWP connection.

Why is this a problem?

Since the client_secret key is returned with the AJAX request, attackers with low-level access to a vulnerable WordPress site could establish a SendWP connection with their own SendWP account. This would make sites with open-registration particularly vulnerable, the researchers warned.

That’s not all, however. In case attackers could discover the username for an account, they could also trigger a password reset for this account. The impact of these actions is remote code execution:

The password reset email with the password reset link would get logged in the attackers SendWP account, which they could then use to reset an administrator’s password and gain administrative access to a site. This could ultimately lead to remote code execution and site takeover by modifying theme/plugin files or uploading a malicious theme/plugin.

The other three vulnerabilities are not as severe as the as “Authenticated SendWP Plugin Installation and Client Secret Key Disclosure” issue. One of them is rated high, and the other two – medium. The good news is that all four flaws were completely fixed in version 3.4.34.1 of the Ninja Forms plugin. If you are a user of the plugin, you should immediately update to the latest version available, which currently is version 3.5.0.

If you want to stay informed about the latest security risks involving WordPress, keep an eye on HowToHosting.guide. We cover the most important news.

Useful WordPress Tips

TOP 5 WORDPRESS SECURITY PLUGINS TO PROTECT YOUR WEBSITE

HOW TO RESTORE RESTORE WORDPRESS TO DEFAULT SETTINGS

Researched and created by:
Krum Popov
Passionate web entrepreneur, has been crafting web projects since 2007. In 2020, he founded HTH.Guide — a visionary platform dedicated to streamlining the search for the perfect web hosting solution. Read more...
Technically reviewed by:
Metodi Ivanov
Seasoned web development expert with 8+ years of experience, including specialized knowledge in hosting environments. His expertise guarantees that the content meets the highest standards in accuracy and aligns seamlessly with hosting technologies. Read more...

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree
At HTH.Guide, we offer transparent web hosting reviews, ensuring independence from external influences. Our evaluations are unbiased as we apply strict and consistent standards to all reviews.
While we may earn affiliate commissions from some of the companies featured, these commissions do not compromise the integrity of our reviews or influence our rankings.
The affiliate earnings contribute to covering account acquisition, testing expenses, maintenance, and development of our website and internal systems.
Trust HTH.Guide for reliable hosting insights and sincerity.