Arbitrary File Read Vulnerability in Contact Form Plugin
CVE-2024-9507
4.9MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 11 October 2024
Summary
The Contact Form plugin by Bit Form for WordPress contains a vulnerability due to improper input validation in the iconUpload function. This flaw allows authenticated users with Administrator-level access to launch a PHP filter chain attack that can read arbitrary files on the server. As a result, sensitive information stored in these files may be exposed, posing significant risks to data integrity and security.
Affected Version(s)
Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder * <= 2.15.2
References
CVSS V3.1
Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
TANG Cheuk Hei