Input validation vulnerability in Contact Form 7 Style 3.2

The Contact Form 7 Style plugin for WordPress is vulnerable to a type of attack called Cross-Site Request Forgery. This type of attack can occur if someone has an older version of the plugin, up to and including version 3.2. The problem lies in the fact that the plugin has not been properly validated, specifically in the manage_wp_posts_be_qe_save_post() function. This means an unauthenticated attacker could trick an administrator into clicking a malicious link, which would allow them to quickly edit the templates.

Detected in:

Contact Form 7 Style open vulnerable versions: >= * <= 3.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.