CVE-2024-12250

5.3 MEDIUM

📋 TL;DR

The Accept Authorize.NET Payments Using Contact Form 7 WordPress plugin exposes configuration data through the cf7adn-info.php file, allowing unauthenticated attackers to extract sensitive information that could aid in further attacks. All WordPress sites using this plugin up to version 2.2 are affected. This information exposure could reveal payment gateway configuration details.

💻 Affected Systems

Products:
  • Accept Authorize.NET Payments Using Contact Form 7 WordPress plugin
Versions: All versions up to and including 2.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain payment gateway credentials, API keys, or configuration details leading to payment fraud, data theft, or lateral movement into the payment processing system.

🟠

Likely Case

Attackers gather configuration details about the payment setup, WordPress environment, or server information that could be used for targeted attacks against the payment system or WordPress installation.

🟢

If Mitigated

Information exposure is limited to non-critical configuration data that doesn't directly compromise payment processing or sensitive credentials.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests to the vulnerable endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208517%40accept-authorize-net-payments-using-contact-form-7&new=3208517%40accept-authorize-net-payments-using-contact-form-7&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Accept Authorize.NET Payments Using Contact Form 7'. 4. Click 'Update Now' if available, or download version 2.3+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Block access to vulnerable endpoint

all

Add web server rules to block access to cf7adn-info.php file

# Apache .htaccess
<Files "cf7adn-info.php">
    Order Allow,Deny
    Deny from all
</Files>
# Nginx configuration
location ~* /cf7adn-info\.php$ {
    deny all;
    return 403;
}

Disable plugin temporarily

linux

Deactivate the vulnerable plugin until patched

wp plugin deactivate accept-authorize-net-payments-using-contact-form-7

🧯 If You Can't Patch

  • Remove the plugin completely from WordPress installation
  • Implement WAF rules to block requests to cf7adn-info.php endpoint

🔍 How to Verify

Check if Vulnerable:

Access https://yoursite.com/wp-content/plugins/accept-authorize-net-payments-using-contact-form-7/cf7adn-info.php - if it returns configuration data instead of access denied, you're vulnerable.

Check Version:

wp plugin get accept-authorize-net-payments-using-contact-form-7 --field=version

Verify Fix Applied:

Attempt to access the cf7adn-info.php endpoint - should return 403/404 error or access denied message.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to cf7adn-info.php requests
  • Unusual access patterns to plugin files from external IPs

Network Indicators:

  • GET requests to /wp-content/plugins/accept-authorize-net-payments-using-contact-form-7/cf7adn-info.php

SIEM Query:

source="web_access_logs" AND uri="/wp-content/plugins/accept-authorize-net-payments-using-contact-form-7/cf7adn-info.php" AND response="200"

🔗 References

📤 Share & Export