Changelog for
wordpress-plugin-contact-form-7-7.5.0.4-1.3.noarch.rpm :
* Wed Sep 12 2018 Tuukka Pasanen
- A privilege escalation vulnerability has been found in Contact Form 7 5.0.3 and older versions. Utilizing this vulnerability, a logged-in user in the Contributor role can potentially edit contact forms, which only Administrator and Editor-role users are allowed to access by default. This issue has been reported by Simon Scannell from RIPS Technologies. To minimize damage from possible attacks utilizing those vulnerabilities, Contact Form 7 5.0.4 and higher will restrict the local file attachment feature. More particularly, you will no longer be able to specify an absolute file path that refers to a file placed outside the wp-content directory. You can still specify files inside the wp-content directory with relative or absolute file paths, so all you need to change is the location of the attachment files. Requires: WordPress 4.8 or higher Tested up to: WordPress 4.9.8 - Change Log
* Specifies the capability_type argument explicitly in the register_post_type() call to fix the privilege escalation vulnerability issue.
* Local File Attachment – disallows the specifying of absolute file paths referring to files outside the wp-content directory.
* Config Validator – adds a test item to detect invalid file attachment settings.
* Fixes a bug in the JavaScript fallback function for legacy browsers that do not support the HTML5 placeholder attribute.
* Acceptance Checkbox – unsets the form-tag’s do-not-store feature.
* Wed Aug 08 2018 tuukka.pasanenAATTilmi.fi- Update to version 7 5.0.3 Changes:
* CSS: Applies the “not-allowed” cursor style to submit buttons in the “disabled” state.
* Acceptance Checkbox: Revises the tag-generator UI to encourage the use of better options in terms of personal data protection.
* Introduces wpcf7_anonymize_ip_addr() function.
* Introduces the consent_for:storage option for all types of form-tags.
* Mon Jun 18 2018 tuukka.pasanenAATTilmi.fi- Added version 7 5.0.2