Ninjaforms Ninja Forms : Security vulnerabilities, CVEs (2024)

Copy

CVE-2024-29220

Ninja Forms prior to 3.8.1 contains a cross-site scripting vulnerability in custom fields for labels. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing to the website using the product.

Source: JPCERT/CC

Max CVSS

N/A

EPSS Score

0.05%

Published

2024-04-11

Updated

2024-04-11

CVE-2024-26019

Ninja Forms prior to 3.8.1 contains a cross-site scripting vulnerability in submit processing. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing to the website using the product.

Source: JPCERT/CC

Max CVSS

N/A

EPSS Score

0.05%

Published

2024-04-11

Updated

2024-04-11

CVE-2024-2108

The Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an image title embedded into a form in all versions up to, and including, 3.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Source: Wordfence

Max CVSS

4.6

EPSS Score

0.04%

Published

2024-03-29

Updated

2024-03-29

CVE-2024-0685

The Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Second Order SQL Injection via the email address value submitted through forms in all versions up to, and including, 3.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to inject SQL in their email address that will append additional into the already existing query when an administrator triggers a personal data export.

Source: Wordfence

Max CVSS

9.8

EPSS Score

0.07%

Published

2024-02-02

Updated

2024-02-12

CVE-2023-38393

Missing Authorization vulnerability in Saturday Drive Ninja Forms.This issue affects Ninja Forms: from n/a through 3.6.25.

Source: Patchstack

Max CVSS

8.8

EPSS Score

0.05%

Published

2024-06-19

Updated

2024-07-31

CVE-2023-38386

Missing Authorization vulnerability in Saturday Drive Ninja Forms.This issue affects Ninja Forms: from n/a through 3.6.25.

Source: Patchstack

Max CVSS

7.6

EPSS Score

0.04%

Published

2024-06-19

Updated

2024-06-20

CVE-2023-37979

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Saturday Drive Ninja Forms Contact Form plugin <=3.6.25 versions.

Source: Patchstack

Max CVSS

7.1

EPSS Score

0.11%

Published

2023-07-27

Updated

2023-08-04

CVE-2023-35909

Uncontrolled Resource Consumption vulnerability in Saturday Drive Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress leading to DoS.This issue affects Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress: from n/a through 3.6.25.

Source: Patchstack

Max CVSS

5.3

EPSS Score

0.05%

Published

2023-12-07

Updated

2023-12-12

CVE-2023-5530

The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue

Source: WPScan

Max CVSS

4.8

EPSS Score

0.05%

Published

2023-11-06

Updated

2023-11-14

CVE-2023-1835

The Ninja Forms Contact Form WordPress plugin before 3.6.22 does not properly escape user input before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Source: WPScan

Max CVSS

6.1

EPSS Score

0.14%

Published

2023-05-15

Updated

2023-05-23

CVE-2022-2903

The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.

Source: WPScan

Max CVSS

7.2

EPSS Score

0.10%

Published

2022-09-26

Updated

2022-09-28

CVE-2021-36827

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Saturday Drive's Ninja Forms Contact Form plugin <= 3.6.9 at WordPress via "label".

Source: Patchstack

Max CVSS

4.8

EPSS Score

0.05%

Published

2022-06-16

Updated

2023-04-04

CVE-2021-34648

The Ninja Forms WordPress plugin is vulnerable to arbitrary email sending via the trigger_email_action function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to send arbitrary emails from the affected server via the /ninja-forms-submissions/email-action REST API which can be used to socially engineer victims.

Source: Wordfence

Max CVSS

6.4

EPSS Score

0.05%

Published

2021-09-22

Updated

2022-10-27

CVE-2021-34647

The Ninja Forms WordPress plugin is vulnerable to sensitive information disclosure via the bulk_export_submissions function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to export all Ninja Forms submissions data via the /ninja-forms-submissions/export REST API which can include personally identifiable information.

Source: Wordfence

Max CVSS

6.5

EPSS Score

0.07%

Published

2021-09-22

Updated

2022-10-27

CVE-2021-25066

The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitize and escape some imported data, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

Source: WPScan

Max CVSS

4.8

EPSS Score

0.06%

Published

2022-07-04

Updated

2022-07-12

CVE-2021-25056

The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitise and escape field labels, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

Source: WPScan

Max CVSS

4.8

EPSS Score

0.06%

Published

2022-07-04

Updated

2022-07-13

CVE-2021-24889

The Ninja Forms Contact Form WordPress plugin before 3.6.4 does not escape keys of the fields POST parameter, which could allow high privilege users to perform SQL injections attacks

Source: WPScan

Max CVSS

7.2

EPSS Score

0.09%

Published

2021-11-29

Updated

2021-11-29

CVE-2021-24166

The wp_ajax_nf_oauth_disconnect from the Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 had no nonce protection making it possible for attackers to craft a request to disconnect a site's OAuth connection.

Source: WPScan

Max CVSS

5.8

EPSS Score

0.09%

Published

2021-04-05

Updated

2021-04-09

CVE-2021-24165

In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place.

Source: WPScan

Max CVSS

6.1

EPSS Score

0.13%

Published

2021-04-05

Updated

2021-04-09

CVE-2021-24164

In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.

Source: WPScan

Max CVSS

4.3

EPSS Score

0.05%

Published

2021-04-05

Updated

2022-08-30

CVE-2021-24163

The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin.

Source: WPScan

Max CVSS

8.8

EPSS Score

0.10%

Published

2021-04-05

Updated

2022-08-30

CVE-2020-36175

The Ninja Forms plugin before 3.4.27.1 for WordPress allows attackers to bypass validation via the email field.

Source: MITRE

Max CVSS

5.3

EPSS Score

0.08%

Published

2021-01-06

Updated

2021-07-21

CVE-2020-36174

The Ninja Forms plugin before 3.4.27.1 for WordPress allows CSRF via services integration.

Source: MITRE

Max CVSS

6.5

EPSS Score

0.05%

Published

2021-01-06

Updated

2021-01-08

CVE-2020-36173

The Ninja Forms plugin before 3.4.28 for WordPress lacks escaping for submissions-table fields.

Source: MITRE

Max CVSS

5.3

EPSS Score

0.08%

Published

2021-01-06

Updated

2021-07-21

CVE-2020-12462

The ninja-forms plugin before 3.4.24.2 for WordPress allows CSRF with resultant XSS.

Source: MITRE

Max CVSS

6.1

EPSS Score

0.05%

Published

2020-04-29

Updated

2020-05-06

35 vulnerabilities found

1

2

Ninjaforms Ninja Forms : Security vulnerabilities, CVEs (2024)

FAQs

What is the security vulnerability of Ninja Forms? ›

Ninja Forms is no stranger to security problems. In June 2022, WordPress pushed out a forced security update to the plugin after it was found a vulnerability that could allow hackers to execute code or delete files on sites was being actively exploited by hackers.

Is Ninja Forms safe? ›

Ninja Forms does not have any access to your site or the form data entered within your site. We NEVER collect or even have the capacity to see data entered into form fields or any other user data. Ninja Forms does everything it can to make sure all form-submitted data is handled in a secure way as possible.

What is Ninja Forms used for? ›

From simple feedback and contact forms to event registration, file uploads, and more, Ninja Forms offers pre-built templates and options for building custom forms using a drag-and-drop form creator.

Does Ninja Forms have a free version? ›

All the basics without the paywalls. When you're starting out, even little expenses add up quickly. That's why Ninja Forms core will always be free and open source.

What is one of the most vulnerable forms of user authentication? ›

One of the most common authentication vulnerabilities is weak passwords. Many users still opt for easily guessable passwords, such as "123456" or "password." Creating strong, unique passwords for each account is essential to mitigate this risk. Hence, businesses must encourage their customers to use strong passwords.

Where do Ninja form submissions go? ›

Submission data for all forms can be found under Ninja Forms > Submissions in your WordPress admin. Note: to ensure the privacy and security of submitted data, only users with the Administrator role can view and edit submission data by default in Ninja Forms.

What is the difference between Ninja Forms and fluent forms? ›

Both the plugins have advanced input fields but the Ninja Forms plugin doesn't categorize anything as Advanced fields, but there are some input fields that work in an advanced way. While WP Fluent Forms provides a bunch of advanced input fields and the maximum you can get for free.

Is Ninja Form good? ›

Ninja Forms is a popular and highly-rated form plugin. It works well and has a lot of add-on plugins available to expand its features and create all kinds of advanced forms. However, the user interface isn't great for beginners.

What is Ninja software used for? ›

Ninja is used to build Google Chrome, parts of Android, LLVM, and can be used in many other projects due to CMake's Ninja backend. See the manual for more: philosophical background, whether and how you can use Ninja for your project, platform support, and details about the language semantics.

What is Ninja used for? ›

It's also used to build Android (via Makefile translation by Kati), and is used by most developers working on LLVM. In contrast to Make, Ninja lacks features such as string manipulation, as Ninja build files are not meant to be written by hand. Instead, a "build generator" should be used to generate Ninja build files.

How do I save a ninja form to the database? ›

To record saved forms, ensure that the Save feature is turned on for Save to Database/Store Submission as shown in the above screenshot. Navigate to Forms>Submissions, select the desired form, and click on View Saves. Here you will find a list of each saved state of the selected form.

What is Ninja security? ›

An all-in-one security solution for any site. With premium support and continuous updates Security Ninja Pro is a perfect tool to keep your site safe. See what the PRO version offers. Automatically block 600+ million bad IPs with one click!

What is a security weakness or vulnerability? ›

Definitions: Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. Weakness in a system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat.

What is the weakest link in a security program? ›

There's no denying that humans are the weakest link in cybersecurity. No matter how strong your technical defences, such as firewall, IPS, or IDS, are, they can always be circumvented by a determined attacker if they can find a way to trick or coerce a member of your staff into giving them access.

What is authentication vulnerability? ›

What Are Authentication Vulnerabilities? Authentication vulnerabilities are issues that affect authentication processes and make websites and applications susceptible to security attacks in which an attacker can masquerade as a legitimate user.

Top Articles
Oyakodon (Japanese Chicken and Egg Rice Bowl) Recipe
38 last-minute Christmas recipes
3 Tick Granite Osrs
Craigslist Free En Dallas Tx
1970 Chevelle Ss For Sale Craigslist
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Ingles Weekly Ad Lilburn Ga
Volstate Portal
Achivr Visb Verizon
Www Movieswood Com
Our History | Lilly Grove Missionary Baptist Church - Houston, TX
Best Cav Commanders Rok
Bbc 5Live Schedule
Ktbs Payroll Login
Spelunking The Den Wow
REVIEW - Empire of Sin
Sports Clips Plant City
Nitti Sanitation Holiday Schedule
Ts Lillydoll
Jesus Calling Oct 27
Chastity Brainwash
Swedestats
Pizza Hut In Dinuba
Dark Chocolate Cherry Vegan Cinnamon Rolls
Copart Atlanta South Ga
Marquette Gas Prices
Martins Point Patient Portal
Warn Notice Va
Craigslist Free Stuff San Gabriel Valley
Autotrader Bmw X5
What Is Xfinity and How Is It Different from Comcast?
Tgh Imaging Powered By Tower Wesley Chapel Photos
Imperialism Flocabulary Quiz Answers
8005607994
Elizaveta Viktorovna Bout
Mcgiftcardmall.con
Crazy Balls 3D Racing . Online Games . BrightestGames.com
One Main Branch Locator
Insideaveritt/Myportal
Miami Vice turns 40: A look back at the iconic series
LoL Lore: Die Story von Caitlyn, dem Sheriff von Piltover
Winta Zesu Net Worth
Ehome America Coupon Code
Truck Works Dothan Alabama
War Room Pandemic Rumble
Rise Meadville Reviews
Mejores páginas para ver deportes gratis y online - VidaBytes
Identogo Manahawkin
10 Bedroom Airbnb Kissimmee Fl
Roller Znen ZN50QT-E
Joe Bartosik Ms
Philasd Zimbra
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6305

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.