Vulnerability Description
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the entryID parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitapps | Contact Form Builder | >= 2.0.0, < 2.13.10 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/bit-form/trunk/includes/Admin/AdminAjPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/07847ba1-cbce-4d81-bd2Third Party Advisory
FAQ
What is CVE-2024-7702?
CVE-2024-7702 is a vulnerability with a CVSS score of 7.2 (HIGH). The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the entryID ...
How severe is CVE-2024-7702?
CVE-2024-7702 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7702?
Check the references section above for vendor advisories and patch information. Affected products include: Bitapps Contact Form Builder.