Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ninja Team Multi Step for Contact Form cf7-multi-step allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through <= 2.7.7.

Project Subscriptions

Vendors Products
Ninjateam Subscribe
Multi Step For Contact Form Subscribe
Multi Step For Contact Form 7 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-42367 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NinjaTeam Multi Step for Contact Form allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through 2.7.7.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NinjaTeam Multi Step for Contact Form allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through 2.7.7. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ninja Team Multi Step for Contact Form cf7-multi-step allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through <= 2.7.7.
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 14 Nov 2024 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Ninjateam multi Step For Contact Form 7
CPEs cpe:2.3:a:ninjateam:multi_step_for_contact_form_7:*:*:*:*:*:wordpress:*:*
Vendors & Products Ninjateam multi Step For Contact Form 7

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Ninjateam
Ninjateam multi Step For Contact Form
CPEs cpe:2.3:a:ninjateam:multi_step_for_contact_form:*:*:*:*:*:*:*:*
Vendors & Products Ninjateam
Ninjateam multi Step For Contact Form
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Oct 2024 18:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NinjaTeam Multi Step for Contact Form allows SQL Injection.This issue affects Multi Step for Contact Form: from n/a through 2.7.7.
Title WordPress Multi Step for Contact Form plugin <= 2.7.7 - Unauthenticated SQL Injection vulnerability
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T15:35:18.200Z

Reserved: 2024-09-24T13:00:47.393Z

Link: CVE-2024-47331

cve-icon Vulnrichment

Updated: 2024-10-11T18:43:01.380Z

cve-icon NVD

Status : Modified

Published: 2024-10-11T19:15:09.783

Modified: 2026-04-01T16:18:06.210

Link: CVE-2024-47331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses