Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12190: CWE-862 Missing Authorization in bitpressadmin Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder

0
Medium
VulnerabilityCVE-2024-12190cvecve-2024-12190cwe-862
Published: Wed Dec 25 2024 (12/25/2024, 03:21:32 UTC)
Source: CVE Database V5
Vendor/Project: bitpressadmin
Product: Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder

Description

CVE-2024-12190 is a medium-severity vulnerability in the WordPress plugin 'Contact Form by Bit Form' up to version 2. 17. 3. It arises from a missing authorization check on the bitform-form-entry-edit endpoint, allowing authenticated users with Subscriber-level access or higher to view all form submissions, including those of other users. This flaw does not require user interaction and can be exploited remotely over the network. The vulnerability impacts confidentiality but does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or implementing access restrictions to prevent unauthorized data disclosure. The threat primarily affects WordPress sites globally, especially those with Subscriber-level user roles enabled. Countries with significant WordPress usage and e-commerce or service websites relying on this plugin are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:13:18 UTC

Technical Analysis

CVE-2024-12190 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder' developed by bitpressadmin. The issue stems from the absence of a proper capability check on the bitform-form-entry-edit endpoint, which handles form submission entries. This endpoint fails to verify whether the authenticated user has the necessary permissions to view or edit form submissions. Consequently, any authenticated user with at least Subscriber-level privileges can access and view all form submissions made through the plugin, including those submitted by other users. The vulnerability affects all versions up to and including 2.17.3. Exploitation requires authentication but no additional user interaction, and it can be performed remotely over the network. The vulnerability compromises confidentiality by exposing potentially sensitive form data but does not impact data integrity or system availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 4.3, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, requiring low privileges, no user interaction, unchanged scope, and limited confidentiality impact.

Potential Impact

The primary impact of CVE-2024-12190 is unauthorized disclosure of sensitive information submitted via forms on affected WordPress sites. Organizations using this plugin may inadvertently expose personal data, payment information, or other confidential inputs collected through their contact forms to any authenticated user with Subscriber-level access or higher. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), reputational damage, and potential legal liabilities. Although the vulnerability does not allow modification or deletion of data, the exposure of sensitive form submissions can facilitate further social engineering or targeted attacks. The risk is particularly significant for websites that allow broad user registration or have multiple user roles with Subscriber-level permissions. Since WordPress powers a large portion of websites globally, the scope of affected systems is extensive. However, the requirement for authentication limits exploitation to insiders or registered users, reducing the risk of widespread automated attacks. No known active exploitation reduces immediate threat but does not eliminate future risk.

Mitigation Recommendations

1. Update the 'Contact Form by Bit Form' plugin to the latest version once a patch addressing CVE-2024-12190 is released by the vendor. 2. Until a patch is available, restrict user roles and permissions to limit Subscriber-level access only to trusted users. 3. Implement additional access control measures at the web server or application firewall level to block unauthorized requests to the bitform-form-entry-edit endpoint. 4. Monitor user activity logs for unusual access patterns to form submission data. 5. Consider disabling or replacing the vulnerable plugin with alternative contact form solutions that enforce strict authorization checks. 6. Conduct regular security audits and penetration testing focusing on user privilege escalation and data access controls. 7. Educate site administrators and users about the risks of excessive permissions and the importance of least privilege principles. 8. Employ data encryption and anonymization for sensitive form submissions where feasible to reduce impact if data is exposed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-04T16:52:19.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e31b7ef31ef0b59782d

Added to database: 2/25/2026, 9:48:33 PM

Last enriched: 2/26/2026, 6:13:18 AM

Last updated: 2/26/2026, 6:35:04 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats