Skip to main content

CVE-2024-0907: CWE-862 Missing Authorization in webaways NEX-Forms – Ultimate Form Builder – Contact forms and much more

Medium
VulnerabilityCVE-2024-0907cvecve-2024-0907cwe-862
Published: Thu Feb 01 2024 (02/01/2024, 04:31:54 UTC)
Source: CVE
Vendor/Project: webaways
Product: NEX-Forms – Ultimate Form Builder – Contact forms and much more

Description

The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the restore_records() function in all versions up to, and including, 8.5.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to restore records.

AI-Powered Analysis

AILast updated: 07/05/2025, 09:39:33 UTC

Technical Analysis

CVE-2024-0907 is a medium-severity vulnerability affecting the WordPress plugin "NEX-Forms – Ultimate Form Builder – Contact forms and much more" developed by webaways. The vulnerability arises from a missing authorization check (CWE-862) in the restore_records() function present in all versions up to and including 8.5.6. This flaw allows any authenticated user with subscriber-level access or higher to restore previously deleted or archived form records without proper permission validation. The vulnerability does not require elevated privileges beyond subscriber-level, which is typically the lowest authenticated role in WordPress, making exploitation feasible for a broad range of authenticated users. The CVSS 3.1 base score is 5.3 (medium), with an attack vector of network (remote), low attack complexity, no privileges required beyond subscriber, no user interaction needed, and impact limited to integrity (restoring records) without affecting confidentiality or availability. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged to manipulate form data, potentially leading to unauthorized data restoration that might bypass intended data retention or deletion policies. This could have downstream effects on data integrity and trustworthiness of form submissions and records managed by the plugin. Since the vulnerability affects a popular WordPress plugin used for form management, it is relevant to any organization using this plugin for contact forms, surveys, or other data collection purposes. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for mitigation through access control and monitoring until an official update is released.

Potential Impact

For European organizations, the impact of CVE-2024-0907 primarily concerns data integrity within web forms managed by the NEX-Forms plugin. Unauthorized restoration of records could lead to confusion, data inconsistency, or circumvention of data deletion policies, which may conflict with GDPR requirements on data minimization and user data control. While the vulnerability does not directly expose confidential information or cause service disruption, it undermines the trustworthiness of form data, which could affect customer interactions, lead generation, or compliance reporting. Organizations relying on these forms for critical business processes or regulatory data collection may face operational risks or compliance challenges. Additionally, if attackers restore malicious or outdated records, it could indirectly facilitate social engineering or fraud. The medium severity and ease of exploitation by low-privilege users mean that insider threats or compromised low-level accounts could exploit this vulnerability, increasing risk in environments with many authenticated users or weak account management policies.

Mitigation Recommendations

1. Immediately restrict subscriber-level user capabilities by reviewing and tightening WordPress user roles and permissions to limit access to form management features. 2. Implement strict monitoring and logging of form record restoration activities to detect unauthorized actions promptly. 3. Temporarily disable or uninstall the NEX-Forms plugin if it is not essential until a security patch is released. 4. Regularly check for updates from the vendor and apply patches as soon as they become available. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the restore_records() function. 6. Educate users and administrators about the risk of low-privilege account compromise and enforce strong authentication mechanisms, including MFA, to reduce the risk of unauthorized access. 7. Review and enforce data retention and deletion policies to ensure that restored records do not violate compliance requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-01-25T20:17:35.256Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8d5b

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 9:39:33 AM

Last updated: 8/9/2025, 12:13:58 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats