First published: Tue Aug 20 2024(Updated: )
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitapps Contact Form Builder | >=2.0.0<2.13.10 |
https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.6/includes/Admin/AdminAjax.php#L1108
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7780 has been classified as a critical severity level due to its potential for exploiting SQL injection vulnerabilities.
To fix CVE-2024-7780, update the Bitapps Contact Form Builder plugin to version 2.13.10 or later.
CVE-2024-7780 affects versions 2.0 to 2.13.9 of the Contact Form by Bit Form plugin.
CVE-2024-7780 is a generic SQL Injection vulnerability targeting the id parameter.
Users of the Bitapps Contact Form Builder plugin for WordPress running affected versions are at risk due to CVE-2024-7780.