CVE-2024-1218: CWE-862 Missing Authorization in kaliforms Contact Form builder with drag & drop for WordPress – Kali Forms
CVE-2024-1218 is a medium severity vulnerability in the Kali Forms WordPress plugin, affecting all versions up to 2. 3. 41. It involves missing authorization checks on several REST API endpoints, allowing authenticated users with contributor or higher roles to access or modify contact forms and their entries without proper permissions. The flaw stems from inconsistent capability verification, enabling privilege escalation within the WordPress environment. Although exploitation requires at least contributor-level access, no user interaction is needed beyond authentication. The vulnerability impacts confidentiality by exposing form data but does not affect integrity or availability directly. There are currently no known exploits in the wild, and no official patches have been released yet. Organizations using Kali Forms should restrict contributor access and monitor for suspicious API activity until a fix is available.
AI Analysis
Technical Summary
CVE-2024-1218 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Kali Forms plugin for WordPress, which provides a drag-and-drop contact form builder. The issue arises from inconsistent capability checks on multiple REST API endpoints, which are used to manage forms and form entries. Specifically, authenticated users with contributor-level privileges or higher can bypass intended authorization controls to access or modify form data via these endpoints. This vulnerability affects all versions of the plugin up to and including 2.3.41. The root cause is that the plugin's REST API does not properly verify whether the requesting user has sufficient permissions to perform certain actions, leading to unauthorized data exposure or modification. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges of at least contributor level, but no user interaction is needed. The impact is primarily on confidentiality, as unauthorized users can read form data, but integrity and availability are not directly compromised. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability is significant because WordPress sites often rely on plugins like Kali Forms for user interaction and data collection, and unauthorized access to form data could lead to information leakage or further attacks if sensitive data is collected.
Potential Impact
The vulnerability allows authenticated users with contributor or higher privileges to access or modify contact forms and their entries without proper authorization. This can lead to unauthorized disclosure of potentially sensitive information submitted through forms, such as personal data or business inquiries. While the vulnerability does not directly impact data integrity or system availability, the exposure of confidential data can have reputational and compliance consequences for organizations. Attackers could also manipulate form data to mislead site administrators or disrupt normal operations indirectly. Since contributor-level access is often granted to trusted users or external collaborators, this vulnerability increases the risk of insider threats or compromised accounts being leveraged for unauthorized data access. Organizations relying on Kali Forms for critical data collection or customer interaction may face privacy violations and regulatory risks, especially under data protection laws like GDPR or CCPA. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for targeted attacks once the vulnerability details are widely known.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit contributor-level accounts to only trusted users. Review and audit user roles and permissions within WordPress to ensure minimal necessary privileges are assigned. Disable or restrict REST API access for roles that do not require it, using plugins or custom code to enforce capability checks. Monitor REST API usage logs for unusual or unauthorized access patterns related to form endpoints. Consider temporarily deactivating the Kali Forms plugin if contributor access cannot be sufficiently controlled or if sensitive data is handled. Stay informed about updates from the Kali Forms vendor and apply patches promptly once available. Additionally, implement web application firewalls (WAFs) with custom rules to detect and block suspicious API requests targeting form management endpoints. Educate site administrators and contributors about the risks of privilege misuse and encourage strong authentication practices to reduce the risk of compromised accounts.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-1218: CWE-862 Missing Authorization in kaliforms Contact Form builder with drag & drop for WordPress – Kali Forms
Description
CVE-2024-1218 is a medium severity vulnerability in the Kali Forms WordPress plugin, affecting all versions up to 2. 3. 41. It involves missing authorization checks on several REST API endpoints, allowing authenticated users with contributor or higher roles to access or modify contact forms and their entries without proper permissions. The flaw stems from inconsistent capability verification, enabling privilege escalation within the WordPress environment. Although exploitation requires at least contributor-level access, no user interaction is needed beyond authentication. The vulnerability impacts confidentiality by exposing form data but does not affect integrity or availability directly. There are currently no known exploits in the wild, and no official patches have been released yet. Organizations using Kali Forms should restrict contributor access and monitor for suspicious API activity until a fix is available.
AI-Powered Analysis
Technical Analysis
CVE-2024-1218 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Kali Forms plugin for WordPress, which provides a drag-and-drop contact form builder. The issue arises from inconsistent capability checks on multiple REST API endpoints, which are used to manage forms and form entries. Specifically, authenticated users with contributor-level privileges or higher can bypass intended authorization controls to access or modify form data via these endpoints. This vulnerability affects all versions of the plugin up to and including 2.3.41. The root cause is that the plugin's REST API does not properly verify whether the requesting user has sufficient permissions to perform certain actions, leading to unauthorized data exposure or modification. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges of at least contributor level, but no user interaction is needed. The impact is primarily on confidentiality, as unauthorized users can read form data, but integrity and availability are not directly compromised. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability is significant because WordPress sites often rely on plugins like Kali Forms for user interaction and data collection, and unauthorized access to form data could lead to information leakage or further attacks if sensitive data is collected.
Potential Impact
The vulnerability allows authenticated users with contributor or higher privileges to access or modify contact forms and their entries without proper authorization. This can lead to unauthorized disclosure of potentially sensitive information submitted through forms, such as personal data or business inquiries. While the vulnerability does not directly impact data integrity or system availability, the exposure of confidential data can have reputational and compliance consequences for organizations. Attackers could also manipulate form data to mislead site administrators or disrupt normal operations indirectly. Since contributor-level access is often granted to trusted users or external collaborators, this vulnerability increases the risk of insider threats or compromised accounts being leveraged for unauthorized data access. Organizations relying on Kali Forms for critical data collection or customer interaction may face privacy violations and regulatory risks, especially under data protection laws like GDPR or CCPA. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for targeted attacks once the vulnerability details are widely known.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit contributor-level accounts to only trusted users. Review and audit user roles and permissions within WordPress to ensure minimal necessary privileges are assigned. Disable or restrict REST API access for roles that do not require it, using plugins or custom code to enforce capability checks. Monitor REST API usage logs for unusual or unauthorized access patterns related to form endpoints. Consider temporarily deactivating the Kali Forms plugin if contributor access cannot be sufficiently controlled or if sensitive data is handled. Stay informed about updates from the Kali Forms vendor and apply patches promptly once available. Additionally, implement web application firewalls (WAFs) with custom rules to detect and block suspicious API requests targeting form management endpoints. Educate site administrators and contributors about the risks of privilege misuse and encourage strong authentication practices to reduce the risk of compromised accounts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-02-02T20:33:17.834Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d27b7ef31ef0b56e66f
Added to database: 2/25/2026, 9:44:07 PM
Last enriched: 2/26/2026, 9:21:13 AM
Last updated: 2/26/2026, 9:39:26 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.