Vulnerability Description
The Funnelforms Free plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 3.7.3.2 via the 'af2DeleteFontFile' function. This is due to the plugin not properly validating a file or its path prior to deleting it. This makes it possible for authenticated attackers, with administrator-level access and above, to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Funnelforms | Funnelforms Free | <= 3.7.3.2 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.3.2/admin/mProduct
- https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.4.1/admin/mProduct
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3e815531-f966-44a1-a03Third Party Advisory
FAQ
What is CVE-2024-6312?
CVE-2024-6312 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Funnelforms Free plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 3.7.3.2 via the 'af2DeleteFontFile' function. This is due to the plugin not pro...
How severe is CVE-2024-6312?
CVE-2024-6312 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6312?
Check the references section above for vendor advisories and patch information. Affected products include: Funnelforms Funnelforms Free.