The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.17.4 via the Webhooks integration. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. The vulnerability can also be exploited in Multisite environments.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bitapps
Bitapps contact Form Builder |
|
CPEs | cpe:2.3:a:bitapps:contact_form_builder:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Bitapps
Bitapps contact Form Builder |
Mon, 27 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 25 Jan 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.17.4 via the Webhooks integration. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. The vulnerability can also be exploited in Multisite environments. | |
Title | Contact Form by Bit Form <= 2.17.4 - Authenticated (Administrator+) Server-Side Request Forgery | |
Weaknesses | CWE-918 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-25T08:23:15.871Z
Updated: 2025-01-27T15:35:19.178Z
Reserved: 2025-01-16T01:06:43.819Z
Link: CVE-2024-13450

Updated: 2025-01-27T15:35:08.518Z

Status : Analyzed
Published: 2025-01-25T09:15:07.733
Modified: 2025-02-04T20:48:58.000
Link: CVE-2024-13450

No data.