First published: Tue Aug 20 2024(Updated: )
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in multiple functions in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to read and delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contact Form Builder | >=2.0.0<2.13.10 |
https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.3/includes/Admin/AdminAjax.php#L829
https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.3/includes/Admin/AdminAjax.php#L852
https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.3/includes/Admin/AdminAjax.php#L875
https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.3/includes/Admin/AdminAjax.php#L898
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7777 is considered a high severity vulnerability due to arbitrary file read and deletion risks.
To fix CVE-2024-7777, update the Bitapps Contact Form Builder plugin to version 2.13.10 or later.
CVE-2024-7777 affects Bitapps Contact Form Builder plugin versions from 2.0.0 to 2.13.9.
The risks of CVE-2024-7777 include unauthorized access to sensitive files and potential data loss.
Yes, CVE-2024-7777 is a vulnerability in a WordPress plugin specifically designed for contact form management.