The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.17.4 via the Webhooks integration. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. The vulnerability can also be exploited in Multisite environments.
History

Tue, 04 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Bitapps
Bitapps contact Form Builder
CPEs cpe:2.3:a:bitapps:contact_form_builder:*:*:*:*:*:wordpress:*:*
Vendors & Products Bitapps
Bitapps contact Form Builder

Mon, 27 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Jan 2025 08:30:00 +0000

Type Values Removed Values Added
Description The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.17.4 via the Webhooks integration. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. The vulnerability can also be exploited in Multisite environments.
Title Contact Form by Bit Form <= 2.17.4 - Authenticated (Administrator+) Server-Side Request Forgery
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-01-25T08:23:15.871Z

Updated: 2025-01-27T15:35:19.178Z

Reserved: 2025-01-16T01:06:43.819Z

Link: CVE-2024-13450

cve-icon Vulnrichment

Updated: 2025-01-27T15:35:08.518Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-25T09:15:07.733

Modified: 2025-02-04T20:48:58.000

Link: CVE-2024-13450

cve-icon Redhat

No data.