Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12026: CWE-862 Missing Authorization in kofimokome Message Filter for Contact Form 7

0
Medium
VulnerabilityCVE-2024-12026cvecve-2024-12026cwe-862
Published: Sat Dec 07 2024 (12/07/2024, 01:45:50 UTC)
Source: CVE Database V5
Vendor/Project: kofimokome
Product: Message Filter for Contact Form 7

Description

CVE-2024-12026 is a medium-severity vulnerability in the Message Filter for Contact Form 7 WordPress plugin by kofimokome. It stems from a missing authorization check in the saveFilter() function, allowing authenticated users with Subscriber-level access or higher to create new message filters without proper permissions. This flaw does not impact confidentiality or availability but allows unauthorized modification of plugin data, potentially altering form filtering behavior. Exploitation requires no user interaction but does require authentication at a low privilege level. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying custom access controls to prevent unauthorized filter creation. The vulnerability primarily affects WordPress sites worldwide, especially those with many low-privilege users. Countries with significant WordPress usage and active web hosting markets, such as the United States, Germany, United Kingdom, Canada, Australia, and Japan, are most likely impacted. The CVSS score of 4. 3 reflects the limited impact and moderate exploitability of this issue.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:01:57 UTC

Technical Analysis

CVE-2024-12026 is a vulnerability identified in the Message Filter for Contact Form 7 plugin for WordPress, developed by kofimokome. The flaw is due to a missing authorization (CWE-862) in the saveFilter() function, which is responsible for saving message filters within the plugin. This missing capability check means that any authenticated user with Subscriber-level access or higher can create new filters without proper permission validation. Since Subscribers are typically low-privilege users, this vulnerability allows unauthorized modification of plugin data, potentially enabling attackers to manipulate how messages are filtered or processed by the Contact Form 7 plugin. The vulnerability affects all versions up to and including 1.6.3. The CVSS 3.1 base score is 4.3 (medium), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, indicating network attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, but limited integrity impact. No patches or exploits are currently reported, but the vulnerability is publicly disclosed as of December 7, 2024. This issue is significant because Contact Form 7 is a widely used WordPress plugin, and the Message Filter extension is used to customize form message handling. Unauthorized filter creation could be leveraged to bypass intended filtering rules or introduce malicious filtering behavior.

Potential Impact

The primary impact of CVE-2024-12026 is unauthorized modification of message filtering rules within the Contact Form 7 plugin environment. While it does not directly compromise confidentiality or availability, it undermines the integrity of form message processing. Attackers with Subscriber-level access can create filters that may alter or bypass intended filtering logic, potentially allowing spam, malicious content, or unwanted messages to be processed or delivered. This could degrade the reliability of contact forms, facilitate social engineering or phishing attacks, or enable further exploitation by manipulating form data handling. Since the vulnerability requires only low-level authenticated access, it increases the risk from insider threats or compromised low-privilege accounts. Organizations relying on Contact Form 7 with the Message Filter plugin may face reputational damage, increased spam, or indirect security risks if attackers exploit this flaw to manipulate form submissions or evade detection mechanisms.

Mitigation Recommendations

To mitigate CVE-2024-12026, organizations should first verify if they use the Message Filter for Contact Form 7 plugin and identify the installed version. Since no official patch is currently available, administrators should consider the following specific actions: 1) Restrict Subscriber-level user creation and monitor existing low-privilege accounts to reduce the risk of exploitation. 2) Implement custom capability checks or hooks in WordPress to enforce authorization on the saveFilter() function, ensuring only trusted roles (e.g., Administrator or Editor) can create or modify filters. 3) Employ web application firewalls (WAFs) with rules to detect and block unauthorized POST requests targeting the filter creation endpoints. 4) Monitor plugin logs and WordPress audit trails for unusual filter creation activity or changes in message filtering behavior. 5) Educate site administrators about the risk and encourage prompt updates once an official patch is released. 6) Consider temporarily disabling the Message Filter plugin if the risk outweighs its benefits until a fix is available. These targeted mitigations go beyond generic advice by focusing on access control hardening and monitoring specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T14:52:14.926Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2ab7ef31ef0b5970ce

Added to database: 2/25/2026, 9:48:26 PM

Last enriched: 2/26/2026, 7:01:57 AM

Last updated: 2/26/2026, 8:02:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats