First published: Sat Aug 17 2024(Updated: )
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Arbitrary File Upload due to insufficient file type validation in versions up to, and including, 3.2.4. This allows unauthenticated visitors to perform a "double extension" attack and upload files containing a malicious extension but ending with a benign extension, which may make remote code execution possible in some configurations.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpmet Metform Elementor Contact Form Builder | <=3.2.4 | |
MetForm Contact Form, Survey, Quiz, & Custom Form Builder for Elementor | <3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0714 has a high severity rating due to the possibility of arbitrary file uploads by unauthenticated users.
To fix CVE-2023-0714, update the Metform Elementor Contact Form Builder plugin to version 3.2.5 or higher.
CVE-2023-0714 affects all versions of Metform Elementor Contact Form Builder up to and including version 3.2.4.
Yes, unauthorized users can exploit CVE-2023-0714 to upload malicious files due to inadequate file type validation.
CVE-2023-0714 is related to a "double extension" attack allowing the upload of potentially harmful files.