CVE-2024-7782
moderate-risk
Published 2024-08-20
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the iconRemove function in versions 2.0 to 2.13.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Do I need to act?
!
10.1% chance of exploitation in next 30 days
EPSS score — higher than 90% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.7/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Contact Form Builder
Affected Vendors
References (2)
46
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
11/34 · Low
Exposure
5/34 · Minimal