Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1069: CWE-434 Unrestricted Upload of File with Dangerous Type in crmperks Database for Contact Form 7, WPforms, Elementor forms

0
High
VulnerabilityCVE-2024-1069cvecve-2024-1069cwe-434
Published: Wed Jan 31 2024 (01/31/2024, 02:35:09 UTC)
Source: CVE Database V5
Vendor/Project: crmperks
Product: Database for Contact Form 7, WPforms, Elementor forms

Description

The Contact Form Entries plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'view_page' function in versions up to, and including, 1.3.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:04:05 UTC

Technical Analysis

CVE-2024-1069 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the crmperks Database plugin for WordPress, which integrates with popular form plugins such as Contact Form 7, WPforms, and Elementor forms. The flaw exists in the 'view_page' function, where the plugin fails to properly validate uploaded files, allowing authenticated users with administrator-level privileges or higher to upload arbitrary files to the server. Because the plugin does not restrict file types or sanitize file contents adequately, attackers can upload malicious scripts or executables. This can lead to remote code execution (RCE), enabling attackers to execute arbitrary commands on the web server, potentially leading to full site compromise, data theft, defacement, or pivoting to internal networks. The vulnerability affects all versions up to and including 1.3.2 of the plugin. The CVSS 3.1 score of 7.2 indicates a high severity, with network attack vector, low attack complexity, and no user interaction required. Although exploitation requires administrator privileges, the impact on confidentiality, integrity, and availability is severe. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple administrators or compromised credentials.

Potential Impact

The potential impact of CVE-2024-1069 is substantial for organizations using the affected crmperks Database plugin with Contact Form 7, WPforms, or Elementor forms on WordPress. Successful exploitation allows attackers to upload arbitrary files, including web shells or malicious scripts, leading to remote code execution. This can result in full server compromise, data breaches, defacement, malware distribution, and lateral movement within the network. Confidential data stored on the website or connected systems may be exposed or altered. The integrity of the website content and backend systems can be undermined, and availability may be disrupted through destructive payloads or denial-of-service conditions. Since the vulnerability requires administrator-level access, the risk is elevated in environments where administrator credentials are shared, weak, or compromised. The widespread use of WordPress and these popular form plugins means many organizations globally, including enterprises, SMBs, and government agencies, could be affected. The lack of known exploits in the wild currently reduces immediate risk but also means attackers may develop exploits soon, increasing urgency for mitigation.

Mitigation Recommendations

1. Immediate mitigation involves restricting administrator access to trusted personnel only and enforcing strong, unique credentials with multi-factor authentication to reduce the risk of credential compromise. 2. Monitor and audit administrator activities and uploaded files for suspicious behavior or unauthorized uploads. 3. If possible, disable or remove the crmperks Database plugin until a patched version is released. 4. Implement web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts targeting this plugin. 5. Employ file integrity monitoring to detect unauthorized changes or uploads on the server. 6. Regularly back up website data and server configurations to enable recovery in case of compromise. 7. Once a patch is available, apply it promptly to remediate the vulnerability. 8. Consider isolating the WordPress environment using containerization or sandboxing to limit the impact of potential exploitation. 9. Educate administrators on the risks of file uploads and the importance of cautious plugin management. 10. Review and harden server-side file upload handling policies and permissions to minimize attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-01-30T14:03:32.577Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683879c8182aa0cae2829687

Added to database: 5/29/2025, 3:14:16 PM

Last enriched: 2/28/2026, 8:04:05 AM

Last updated: 3/25/2026, 6:38:36 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses