The CP Contact Form with PayPal plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.52. This is due to missing or incorrect nonce validation on the cp_contact_form_paypal_check_init_actions() function. This makes it possible for unauthenticated attackers to add discount codes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE ID: CVE-2024-13758
CVSS Base Severity: MEDIUM
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Vendor: codepeople
Product: CP Contact Form with PayPal
EPSS Score: 0.05% (probability of being exploited)
EPSS Percentile: 25.62% (scored less or equal to compared to others)
EPSS Date: 2025-02-28 (when was this score calculated)