CVE-2023-27460

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WordPress CP Contact Form with PayPal plugin. It allows unauthenticated attackers to submit feedback forms without proper authorization, potentially enabling spam or malicious content submission. All WordPress sites using affected plugin versions are vulnerable.

💻 Affected Systems

Products:
  • WordPress CP Contact Form with PayPal plugin
Versions: n/a through 1.3.34
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could flood the site with malicious form submissions, potentially leading to denial of service, data corruption, or injection of malicious content that could affect site visitors.

🟠

Likely Case

Spam form submissions, unauthorized data collection through feedback forms, and potential reputation damage to the affected website.

🟢

If Mitigated

With proper authorization controls, only legitimate users can submit forms, preventing unauthorized submissions while maintaining normal functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.35 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/cp-contact-form-with-paypal/wordpress-cp-contact-form-with-paypal-plugin-1-3-34-missing-authorization-leading-to-feedback-submission-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'CP Contact Form with PayPal'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.3.35+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the CP Contact Form with PayPal plugin until patched

wp plugin deactivate cp-contact-form-with-paypal

Restrict form access via .htaccess

linux

Add IP restrictions to form submission endpoints

Order deny,allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized form submissions
  • Monitor and rate-limit form submission endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for CP Contact Form with PayPal version

Check Version:

wp plugin get cp-contact-form-with-paypal --field=version

Verify Fix Applied:

Verify plugin version is 1.3.35 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of form submissions from single IPs
  • Form submissions without corresponding user sessions

Network Indicators:

  • HTTP POST requests to /wp-content/plugins/cp-contact-form-with-paypal/ endpoints without authentication

SIEM Query:

source="web_logs" AND uri="/wp-content/plugins/cp-contact-form-with-paypal/" AND method="POST" AND NOT user_agent="WordPress/*"

🔗 References

📤 Share & Export