Skip to main content

CVE-2024-1217: CWE-862 Missing Authorization in kaliforms Contact Form builder with drag & drop for WordPress – Kali Forms

Medium
Published: Tue Feb 20 2024 (02/20/2024, 18:56:35 UTC)
Source: CVE
Vendor/Project: kaliforms
Product: Contact Form builder with drag & drop for WordPress – Kali Forms

Description

The Contact Form builder with drag & drop for WordPress – Kali Forms plugin for WordPress is vulnerable to unauthorized plugin deactivation due to a missing capability check on the await_plugin_deactivation function in all versions up to, and including, 2.3.41. This makes it possible for authenticated attackers, with subscriber access or higher, to deactivate any active plugins.

AI-Powered Analysis

AILast updated: 06/24/2025, 05:11:24 UTC

Technical Analysis

CVE-2024-1217 is a vulnerability identified in the Kali Forms WordPress plugin, specifically the Contact Form builder with drag & drop functionality. The flaw arises from a missing authorization check in the await_plugin_deactivation function, which is responsible for handling plugin deactivation requests. This missing capability check means that any authenticated user with subscriber-level access or higher can exploit this vulnerability to deactivate any active plugin on the WordPress site. Since subscriber roles are typically assigned to users with minimal privileges, this vulnerability effectively allows low-privileged users to escalate their impact by disabling critical plugins, potentially disrupting site functionality or security controls. The vulnerability affects all versions of Kali Forms up to and including version 2.3.41. No public exploits have been reported in the wild as of the publication date, and no official patches have been linked yet. The underlying weakness is classified under CWE-862, which refers to missing authorization, indicating that the system fails to verify whether the user is permitted to perform the requested action. This vulnerability compromises the integrity and availability of the WordPress environment by allowing unauthorized plugin deactivation, which could lead to denial of service or removal of security plugins, thereby increasing the risk of further exploitation.

Potential Impact

For European organizations using WordPress sites with the Kali Forms plugin, this vulnerability poses a significant risk to website availability and security posture. Unauthorized deactivation of plugins can disrupt business operations, especially if critical plugins related to e-commerce, security (such as firewalls or malware scanners), or compliance are disabled. This could lead to service outages, loss of customer trust, and potential regulatory non-compliance under frameworks like GDPR if personal data protection mechanisms are compromised. Additionally, attackers could leverage this vulnerability to disable security plugins, paving the way for further attacks such as data breaches or website defacements. The impact is particularly severe for organizations with multiple users having subscriber or higher roles, including content contributors or registered users, as it broadens the attack surface. Since WordPress powers a significant portion of websites in Europe, including those of SMEs, public institutions, and e-commerce platforms, the potential for disruption is considerable.

Mitigation Recommendations

1. Immediate mitigation should involve restricting subscriber and other low-privilege user roles from accessing the plugin deactivation functionality by applying custom role-based access controls or using security plugins that enforce strict capability checks. 2. Administrators should monitor plugin status regularly and set up alerts for unexpected plugin deactivations. 3. Until an official patch is released, consider temporarily disabling or removing the Kali Forms plugin if it is not critical to operations. 4. Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Conduct a thorough audit of user roles and permissions to ensure that only trusted users have subscriber or higher access, minimizing the number of accounts that could exploit this flaw. 6. Stay informed about updates from the Kali Forms vendor and apply patches promptly once available. 7. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized plugin deactivation attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-02T20:01:53.226Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1090

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 5:11:24 AM

Last updated: 8/14/2025, 9:47:28 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats