First published: Wed Jan 31 2024(Updated: )
The Contact Form Entries plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'view_page' function in versions up to, and including, 1.3.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Crmperks Database for Contact Form 7, WPForms, Elementor Forms | <1.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1069 has a high severity rating due to the risk of arbitrary file uploads.
To fix CVE-2024-1069, upgrade the Contact Form Entries plugin to version 1.3.3 or later.
CVE-2024-1069 affects users of the Contact Form Entries plugin for WordPress prior to version 1.3.3.
CVE-2024-1069 enables authenticated attackers with administrator-level capabilities to upload arbitrary files.
The vulnerability in CVE-2024-1069 is present in the 'view_page' function of the Contact Form Entries plugin.