🔐 CVE Alert

CVE-2023-6630

MEDIUM 4.3

Contact Form 7 – Dynamic Text Extension <= 4.1.0 - Insecure Direct Object Reference

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

The Contact Form 7 – Dynamic Text Extension plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the CF7_get_custom_field and CF7_get_current_user shortcodes due to missing validation on a user controlled key. This makes it possible for authenticated attackers with contributor access or higher to access arbitrary metadata of any post type, referencing the post by id and the meta by key.

CWE CWE-359
Vendor sevenspark
Product contact form 7 – dynamic text extension
Published Jan 11, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for sevenspark contact form 7 – dynamic text extension

Be the first to know when new medium vulnerabilities affecting sevenspark contact form 7 – dynamic text extension are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

sevenspark / Contact Form 7 – Dynamic Text Extension
0 ≤ 4.1.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/a3f1d836-da32-414f-9f2b-d485c44b2486?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3019572%40contact-form-7-dynamic-text-extension%2Ftrunk&old=2968460%40contact-form-7-dynamic-text-extension%2Ftrunk&sfp_email=&sfph_mail=#file4

Credits

Francesco Carlucci