CVE-2024-1217: CWE-862 Missing Authorization in kaliforms Contact Form builder with drag & drop for WordPress – Kali Forms
The Contact Form builder with drag & drop for WordPress – Kali Forms plugin for WordPress is vulnerable to unauthorized plugin deactivation due to a missing capability check on the await_plugin_deactivation function in all versions up to, and including, 2.3.41. This makes it possible for authenticated attackers, with subscriber access or higher, to deactivate any active plugins.
AI Analysis
Technical Summary
CVE-2024-1217 is a vulnerability identified in the Kali Forms WordPress plugin, specifically the Contact Form builder with drag & drop functionality. The flaw arises from a missing authorization check in the await_plugin_deactivation function, which is responsible for handling plugin deactivation requests. This missing capability check means that any authenticated user with subscriber-level access or higher can exploit this vulnerability to deactivate any active plugin on the WordPress site. Since subscriber roles are typically assigned to users with minimal privileges, this vulnerability effectively allows low-privileged users to escalate their impact by disabling critical plugins, potentially disrupting site functionality or security controls. The vulnerability affects all versions of Kali Forms up to and including version 2.3.41. No public exploits have been reported in the wild as of the publication date, and no official patches have been linked yet. The underlying weakness is classified under CWE-862, which refers to missing authorization, indicating that the system fails to verify whether the user is permitted to perform the requested action. This vulnerability compromises the integrity and availability of the WordPress environment by allowing unauthorized plugin deactivation, which could lead to denial of service or removal of security plugins, thereby increasing the risk of further exploitation.
Potential Impact
For European organizations using WordPress sites with the Kali Forms plugin, this vulnerability poses a significant risk to website availability and security posture. Unauthorized deactivation of plugins can disrupt business operations, especially if critical plugins related to e-commerce, security (such as firewalls or malware scanners), or compliance are disabled. This could lead to service outages, loss of customer trust, and potential regulatory non-compliance under frameworks like GDPR if personal data protection mechanisms are compromised. Additionally, attackers could leverage this vulnerability to disable security plugins, paving the way for further attacks such as data breaches or website defacements. The impact is particularly severe for organizations with multiple users having subscriber or higher roles, including content contributors or registered users, as it broadens the attack surface. Since WordPress powers a significant portion of websites in Europe, including those of SMEs, public institutions, and e-commerce platforms, the potential for disruption is considerable.
Mitigation Recommendations
1. Immediate mitigation should involve restricting subscriber and other low-privilege user roles from accessing the plugin deactivation functionality by applying custom role-based access controls or using security plugins that enforce strict capability checks. 2. Administrators should monitor plugin status regularly and set up alerts for unexpected plugin deactivations. 3. Until an official patch is released, consider temporarily disabling or removing the Kali Forms plugin if it is not critical to operations. 4. Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Conduct a thorough audit of user roles and permissions to ensure that only trusted users have subscriber or higher access, minimizing the number of accounts that could exploit this flaw. 6. Stay informed about updates from the Kali Forms vendor and apply patches promptly once available. 7. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized plugin deactivation attempts targeting this vulnerability.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-1217: CWE-862 Missing Authorization in kaliforms Contact Form builder with drag & drop for WordPress – Kali Forms
Description
The Contact Form builder with drag & drop for WordPress – Kali Forms plugin for WordPress is vulnerable to unauthorized plugin deactivation due to a missing capability check on the await_plugin_deactivation function in all versions up to, and including, 2.3.41. This makes it possible for authenticated attackers, with subscriber access or higher, to deactivate any active plugins.
AI-Powered Analysis
Technical Analysis
CVE-2024-1217 is a vulnerability identified in the Kali Forms WordPress plugin, specifically the Contact Form builder with drag & drop functionality. The flaw arises from a missing authorization check in the await_plugin_deactivation function, which is responsible for handling plugin deactivation requests. This missing capability check means that any authenticated user with subscriber-level access or higher can exploit this vulnerability to deactivate any active plugin on the WordPress site. Since subscriber roles are typically assigned to users with minimal privileges, this vulnerability effectively allows low-privileged users to escalate their impact by disabling critical plugins, potentially disrupting site functionality or security controls. The vulnerability affects all versions of Kali Forms up to and including version 2.3.41. No public exploits have been reported in the wild as of the publication date, and no official patches have been linked yet. The underlying weakness is classified under CWE-862, which refers to missing authorization, indicating that the system fails to verify whether the user is permitted to perform the requested action. This vulnerability compromises the integrity and availability of the WordPress environment by allowing unauthorized plugin deactivation, which could lead to denial of service or removal of security plugins, thereby increasing the risk of further exploitation.
Potential Impact
For European organizations using WordPress sites with the Kali Forms plugin, this vulnerability poses a significant risk to website availability and security posture. Unauthorized deactivation of plugins can disrupt business operations, especially if critical plugins related to e-commerce, security (such as firewalls or malware scanners), or compliance are disabled. This could lead to service outages, loss of customer trust, and potential regulatory non-compliance under frameworks like GDPR if personal data protection mechanisms are compromised. Additionally, attackers could leverage this vulnerability to disable security plugins, paving the way for further attacks such as data breaches or website defacements. The impact is particularly severe for organizations with multiple users having subscriber or higher roles, including content contributors or registered users, as it broadens the attack surface. Since WordPress powers a significant portion of websites in Europe, including those of SMEs, public institutions, and e-commerce platforms, the potential for disruption is considerable.
Mitigation Recommendations
1. Immediate mitigation should involve restricting subscriber and other low-privilege user roles from accessing the plugin deactivation functionality by applying custom role-based access controls or using security plugins that enforce strict capability checks. 2. Administrators should monitor plugin status regularly and set up alerts for unexpected plugin deactivations. 3. Until an official patch is released, consider temporarily disabling or removing the Kali Forms plugin if it is not critical to operations. 4. Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Conduct a thorough audit of user roles and permissions to ensure that only trusted users have subscriber or higher access, minimizing the number of accounts that could exploit this flaw. 6. Stay informed about updates from the Kali Forms vendor and apply patches promptly once available. 7. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized plugin deactivation attempts targeting this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-02-02T20:01:53.226Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf1090
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/24/2025, 5:11:24 AM
Last updated: 8/14/2025, 9:47:28 PM
Views: 16
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.