Vulnerability Description
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitapps | Contact Form Builder | >= 2.0.0, < 2.13.10 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.6/includes/Admin/APatch
- https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.6/includes/Admin/FPatch
- https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.6/includes/Core/MePatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/73b6b22a-4699-4307-8a0Third Party Advisory
FAQ
What is CVE-2024-7780?
CVE-2024-7780 is a vulnerability with a CVSS score of 7.2 (HIGH). The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id param...
How severe is CVE-2024-7780?
CVE-2024-7780 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7780?
Check the references section above for vendor advisories and patch information. Affected products include: Bitapps Contact Form Builder.