v1.6-v1.7-v8x /!\Security ALERT - PrestaHero Contact Form 7 - Version: 2.3.9 to 2.4.1 (latest)

alami64

Member
XNullUser
Joined
Mar 26, 2021
Messages
456
Reaction score
0
Points
16
NullCash
0
Good addon, thanks for sharing, much apreciated!
 

josec

New member
XNullUser
Joined
Mar 5, 2023
Messages
20
Reaction score
0
Points
1
Location
spain
NullCash
1
thanks for you alert and sharing, greetings
 

Jan Doe

Member
XNullUser
Joined
Sep 11, 2019
Messages
474
Reaction score
10
Points
18
NullCash
28
Does this also apply to the ets contactform ultimate v1.3.8 module?
 

info2019

New member
XNullUser
Joined
Jan 3, 2024
Messages
1
Reaction score
0
Points
1
Location
рф
NullCash
8
I like this module. I want to download the latest version available on the website.
Post automatically merged:

I liked the theme!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Post automatically merged:


Post automatically merged:


Post automatically merged:


Post automatically merged:


Post automatically merged:


Code:
[THANKS][/THANKS]
 
Last edited:

SuperApe

Member
XNullUser
Joined
May 8, 2022
Messages
63
Reaction score
5
Points
8
NullCash
7
⚠️ Security Alert: PrestaShop Module "Contact Form 7" (ets_contactform7)

The "Contact Form 7" module (version 2.3.9 and even the latest official available version) available on this forum contains critical vulnerabilities that allow attackers to perform unauthorized actions, exfiltrate database data, and execute malicious code in administrators' browsers.

Key issues:
  • Broken access control: Any authenticated back-office user with minimal rights can delete forms or modify configurations via crafted URLs.
  • Disabled SSL verification: External requests (e.g., to Google reCAPTCHA) are exposed to MITM attacks.
  • SQL injection: Attackers can extract data from any database table using time-based blind SQL injection techniques.
  • Reflected XSS: Crafted URLs can execute JavaScript in admin sessions, leading to potential account hijacking.
  • No CSRF protection & weak file validation: Exposes forms to forced submissions and file upload bypass.

Impact:
Severe risk to data confidentiality and store integrity. Exploits can be carried out by low-privilege internal users or via targeted admin attacks.

Recommendation:
Immediately uninstall or disable this module. Wait for an official patch or switch to a more secure alternative.




Please find attached the detailed audit document for technical teams and security reviewers.

This is a great module. It's great to see it keeps getting updated. I will test to check it out. Thanks for posting.
 
Top