The Contact Form 7 Style plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2. This is due to missing or incorrect nonce validation on the manage_wp_posts_be_qe_save_post() function. This makes it possible for unauthenticated attackers to quick edit templates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Contact Form 7 Style <= 3.2 - Cross-Site Request Forgery Bypass | |
| Weaknesses | CWE-352 |
Mon, 28 Oct 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:43:19.947Z
Reserved: 2023-06-30T15:45:10.413Z
Link: CVE-2021-4390
Updated: 2024-08-03T17:23:10.717Z
Status : Modified
Published: 2023-07-01T05:15:15.717
Modified: 2026-04-08T17:16:40.773
Link: CVE-2021-4390
No data.
OpenCVE Enrichment
No data.