Step 1: REST API Endpoint Discovery: The attacker identifies the vulnerable REST API endpoint within the Ninja Forms plugin. This endpoint is responsible for generating access tokens.
Step 2: Unauthenticated Request: The attacker crafts an unauthenticated request to the identified REST API endpoint. The request may include specific parameters or data that the plugin incorrectly trusts.
Step 3: Token Generation: Due to the vulnerability, the plugin processes the unauthenticated request and generates a valid access token. This token is likely returned in the response.
Step 4: Token Usage: The attacker uses the generated access token to authenticate subsequent requests to the Ninja Forms REST API. These requests are now authorized as if they were made by a legitimate user.
Step 5: Data Exfiltration: The attacker uses the token to access and retrieve sensitive form submission data, including personal information, contact details, and other confidential information.