Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1217: CWE-862 Missing Authorization in kaliforms Contact Form builder with drag & drop for WordPress – Kali Forms

0
Medium
Published: Tue Feb 20 2024 (02/20/2024, 18:56:35 UTC)
Source: CVE
Vendor/Project: kaliforms
Product: Contact Form builder with drag & drop for WordPress – Kali Forms

Description

The Contact Form builder with drag & drop for WordPress – Kali Forms plugin for WordPress is vulnerable to unauthorized plugin deactivation due to a missing capability check on the await_plugin_deactivation function in all versions up to, and including, 2.3.41. This makes it possible for authenticated attackers, with subscriber access or higher, to deactivate any active plugins.

AI-Powered Analysis

AILast updated: 06/24/2025, 05:11:24 UTC

Technical Analysis

CVE-2024-1217 is a vulnerability identified in the Kali Forms WordPress plugin, specifically the Contact Form builder with drag & drop functionality. The flaw arises from a missing authorization check in the await_plugin_deactivation function, which is responsible for handling plugin deactivation requests. This missing capability check means that any authenticated user with subscriber-level access or higher can exploit this vulnerability to deactivate any active plugin on the WordPress site. Since subscriber roles are typically assigned to users with minimal privileges, this vulnerability effectively allows low-privileged users to escalate their impact by disabling critical plugins, potentially disrupting site functionality or security controls. The vulnerability affects all versions of Kali Forms up to and including version 2.3.41. No public exploits have been reported in the wild as of the publication date, and no official patches have been linked yet. The underlying weakness is classified under CWE-862, which refers to missing authorization, indicating that the system fails to verify whether the user is permitted to perform the requested action. This vulnerability compromises the integrity and availability of the WordPress environment by allowing unauthorized plugin deactivation, which could lead to denial of service or removal of security plugins, thereby increasing the risk of further exploitation.

Potential Impact

For European organizations using WordPress sites with the Kali Forms plugin, this vulnerability poses a significant risk to website availability and security posture. Unauthorized deactivation of plugins can disrupt business operations, especially if critical plugins related to e-commerce, security (such as firewalls or malware scanners), or compliance are disabled. This could lead to service outages, loss of customer trust, and potential regulatory non-compliance under frameworks like GDPR if personal data protection mechanisms are compromised. Additionally, attackers could leverage this vulnerability to disable security plugins, paving the way for further attacks such as data breaches or website defacements. The impact is particularly severe for organizations with multiple users having subscriber or higher roles, including content contributors or registered users, as it broadens the attack surface. Since WordPress powers a significant portion of websites in Europe, including those of SMEs, public institutions, and e-commerce platforms, the potential for disruption is considerable.

Mitigation Recommendations

1. Immediate mitigation should involve restricting subscriber and other low-privilege user roles from accessing the plugin deactivation functionality by applying custom role-based access controls or using security plugins that enforce strict capability checks. 2. Administrators should monitor plugin status regularly and set up alerts for unexpected plugin deactivations. 3. Until an official patch is released, consider temporarily disabling or removing the Kali Forms plugin if it is not critical to operations. 4. Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Conduct a thorough audit of user roles and permissions to ensure that only trusted users have subscriber or higher access, minimizing the number of accounts that could exploit this flaw. 6. Stay informed about updates from the Kali Forms vendor and apply patches promptly once available. 7. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized plugin deactivation attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-02T20:01:53.226Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1090

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 5:11:24 AM

Last updated: 11/29/2025, 6:26:32 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats