CVE-2024-0907: CWE-862 Missing Authorization in webaways NEX-Forms – Ultimate Form Builder – Contact forms and much more
The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the restore_records() function in all versions up to, and including, 8.5.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to restore records.
AI Analysis
Technical Summary
CVE-2024-0907 is a vulnerability identified in the NEX-Forms – Ultimate Form Builder plugin for WordPress, developed by webaways. The flaw arises from a missing authorization check in the restore_records() function, which is responsible for restoring previously deleted or archived form records. This missing capability check means that any authenticated user with subscriber-level privileges or higher can invoke this function to restore records without proper permissions. The vulnerability affects all versions of the plugin up to and including 8.5.6. Since WordPress roles such as subscriber are typically assigned to users with minimal privileges, this vulnerability effectively allows low-privileged users to perform unauthorized actions, leading to a form of privilege escalation within the plugin's context. The vulnerability does not impact confidentiality or availability directly but compromises data integrity by allowing unauthorized restoration of form data. The CVSS 3.1 score of 5.3 reflects a medium severity, with an attack vector over the network, low attack complexity, no privileges required beyond subscriber access, and no user interaction needed. No public exploits have been reported yet, but the vulnerability is publicly disclosed and tracked by CISA. The lack of a patch link suggests that users must monitor vendor updates closely. This vulnerability is categorized under CWE-862 (Missing Authorization), highlighting the absence of proper access control checks in critical plugin functions.
Potential Impact
The primary impact of CVE-2024-0907 is unauthorized modification of form data integrity within WordPress sites using the NEX-Forms plugin. Attackers with subscriber-level access can restore deleted or archived form records, potentially reintroducing outdated, incorrect, or malicious data. This can disrupt business processes relying on accurate form submissions, such as customer inquiries, registrations, or feedback. Although the vulnerability does not directly expose sensitive data or cause denial of service, the ability to manipulate form records without authorization can undermine trust in the data and lead to operational confusion or exploitation in chained attacks. Organizations with multiple users having subscriber or higher roles are at greater risk. Since WordPress powers a significant portion of websites globally, especially small to medium businesses and content creators, the scope of affected systems is broad. Attackers could leverage this vulnerability to bypass intended access controls, potentially facilitating further attacks or data misuse within compromised sites.
Mitigation Recommendations
To mitigate CVE-2024-0907, organizations should immediately update the NEX-Forms plugin to a version that includes the proper authorization checks once released by the vendor. Until a patch is available, administrators should restrict subscriber-level user capabilities, limiting access to the plugin's restore functionality through role management or custom capability filters. Implementing a Web Application Firewall (WAF) with rules to detect and block unauthorized requests targeting the restore_records() function can provide temporary protection. Regularly audit user roles and permissions to ensure minimal privilege principles are enforced, reducing the number of users with subscriber or higher access. Monitoring logs for unusual restore activity can help detect exploitation attempts. Additionally, consider isolating critical form data backups and maintaining offline copies to prevent unauthorized restoration. Engage with the plugin vendor for timely updates and subscribe to security advisories to stay informed about patches and exploit developments.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Netherlands, Japan
CVE-2024-0907: CWE-862 Missing Authorization in webaways NEX-Forms – Ultimate Form Builder – Contact forms and much more
Description
The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the restore_records() function in all versions up to, and including, 8.5.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to restore records.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-0907 is a vulnerability identified in the NEX-Forms – Ultimate Form Builder plugin for WordPress, developed by webaways. The flaw arises from a missing authorization check in the restore_records() function, which is responsible for restoring previously deleted or archived form records. This missing capability check means that any authenticated user with subscriber-level privileges or higher can invoke this function to restore records without proper permissions. The vulnerability affects all versions of the plugin up to and including 8.5.6. Since WordPress roles such as subscriber are typically assigned to users with minimal privileges, this vulnerability effectively allows low-privileged users to perform unauthorized actions, leading to a form of privilege escalation within the plugin's context. The vulnerability does not impact confidentiality or availability directly but compromises data integrity by allowing unauthorized restoration of form data. The CVSS 3.1 score of 5.3 reflects a medium severity, with an attack vector over the network, low attack complexity, no privileges required beyond subscriber access, and no user interaction needed. No public exploits have been reported yet, but the vulnerability is publicly disclosed and tracked by CISA. The lack of a patch link suggests that users must monitor vendor updates closely. This vulnerability is categorized under CWE-862 (Missing Authorization), highlighting the absence of proper access control checks in critical plugin functions.
Potential Impact
The primary impact of CVE-2024-0907 is unauthorized modification of form data integrity within WordPress sites using the NEX-Forms plugin. Attackers with subscriber-level access can restore deleted or archived form records, potentially reintroducing outdated, incorrect, or malicious data. This can disrupt business processes relying on accurate form submissions, such as customer inquiries, registrations, or feedback. Although the vulnerability does not directly expose sensitive data or cause denial of service, the ability to manipulate form records without authorization can undermine trust in the data and lead to operational confusion or exploitation in chained attacks. Organizations with multiple users having subscriber or higher roles are at greater risk. Since WordPress powers a significant portion of websites globally, especially small to medium businesses and content creators, the scope of affected systems is broad. Attackers could leverage this vulnerability to bypass intended access controls, potentially facilitating further attacks or data misuse within compromised sites.
Mitigation Recommendations
To mitigate CVE-2024-0907, organizations should immediately update the NEX-Forms plugin to a version that includes the proper authorization checks once released by the vendor. Until a patch is available, administrators should restrict subscriber-level user capabilities, limiting access to the plugin's restore functionality through role management or custom capability filters. Implementing a Web Application Firewall (WAF) with rules to detect and block unauthorized requests targeting the restore_records() function can provide temporary protection. Regularly audit user roles and permissions to ensure minimal privilege principles are enforced, reducing the number of users with subscriber or higher access. Monitoring logs for unusual restore activity can help detect exploitation attempts. Additionally, consider isolating critical form data backups and maintaining offline copies to prevent unauthorized restoration. Engage with the plugin vendor for timely updates and subscribe to security advisories to stay informed about patches and exploit developments.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-01-25T20:17:35.256Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd8d5b
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 2/28/2026, 11:12:28 AM
Last updated: 3/25/2026, 5:57:03 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.