Skip to main content

CVE-2024-1069: CWE-434 Unrestricted Upload of File with Dangerous Type in crmperks Database for Contact Form 7, WPforms, Elementor forms

High
VulnerabilityCVE-2024-1069cvecve-2024-1069cwe-434
Published: Wed Jan 31 2024 (01/31/2024, 02:35:09 UTC)
Source: CVE Database V5
Vendor/Project: crmperks
Product: Database for Contact Form 7, WPforms, Elementor forms

Description

The Contact Form Entries plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'view_page' function in versions up to, and including, 1.3.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 07/08/2025, 01:26:50 UTC

Technical Analysis

CVE-2024-1069 is a high-severity vulnerability affecting the crmperks Database plugin for WordPress, which integrates with popular form plugins such as Contact Form 7, WPForms, and Elementor Forms. The vulnerability arises from insufficient validation of uploaded files within the 'view_page' function in versions up to and including 1.3.2. Specifically, authenticated users with administrator-level privileges or higher can exploit this flaw to upload arbitrary files without proper restrictions on file types. This unrestricted file upload vulnerability (classified under CWE-434) can lead to remote code execution (RCE) if malicious files such as web shells or scripts are uploaded and executed on the server. The CVSS 3.1 base score of 7.2 reflects the network attack vector, low attack complexity, high privileges required, no user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of the affected WordPress plugins and the potential for attackers to gain full control over vulnerable websites. The vulnerability is particularly dangerous because it requires administrator privileges, which means that attackers who have already compromised admin credentials or gained admin access through other means can leverage this flaw to escalate their control and persist on the system. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation through other means.

Potential Impact

For European organizations, this vulnerability can have severe consequences. Many businesses, government agencies, and NGOs in Europe rely on WordPress for their websites and use Contact Form 7, WPForms, or Elementor Forms for customer interaction and data collection. Exploitation could lead to unauthorized data access, defacement, or complete takeover of web servers hosting sensitive information. This can result in data breaches violating GDPR regulations, leading to heavy fines and reputational damage. Additionally, compromised sites can be used as launchpads for further attacks within corporate networks or to distribute malware to visitors. The high integrity and availability impact means that critical services relying on these forms could be disrupted, affecting business continuity. Since the vulnerability requires administrator privileges, the threat is amplified in environments where admin credentials are weak, reused, or exposed through phishing or insider threats. The absence of known exploits does not diminish the risk, as attackers often develop exploits rapidly once a vulnerability is disclosed.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting administrator access and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit administrator activities and uploaded files for suspicious behavior or unauthorized uploads. 3. Implement web application firewalls (WAFs) with custom rules to detect and block attempts to upload dangerous file types or access the vulnerable 'view_page' functionality. 4. Disable or restrict the use of the crmperks Database plugin if it is not essential, or isolate it in a sandboxed environment. 5. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 6. Stay alert for official patches or updates from the vendor and apply them promptly once available. 7. Conduct internal penetration testing focused on file upload functionalities to identify and remediate similar weaknesses. 8. Educate administrators on the risks of phishing and credential theft to prevent initial access by attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-01-30T14:03:32.577Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683879c8182aa0cae2829687

Added to database: 5/29/2025, 3:14:16 PM

Last enriched: 7/8/2025, 1:26:50 AM

Last updated: 8/18/2025, 11:31:48 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats