First published: Wed Feb 05 2025(Updated: )
The WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 8.0.8 via the 'attachments.php' file. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via forms.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tripetto Tripetto | <=8.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13829 has been rated as a high severity vulnerability due to its potential for sensitive information exposure.
To mitigate CVE-2024-13829, update the Tripetto plugin to the latest version beyond 8.0.8.
CVE-2024-13829 may expose sensitive information stored in the 'attachments.php' file of the Tripetto plugin.
All users of the Tripetto plugin for WordPress versions up to and including 8.0.8 are affected by CVE-2024-13829.
Yes, CVE-2024-13829 can be exploited by unauthenticated attackers, making it particularly concerning.