Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12255: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in zealopensource Accept Stripe Payments Using Contact Form 7

0
Medium
VulnerabilityCVE-2024-12255cvecve-2024-12255cwe-200
Published: Thu Dec 12 2024 (12/12/2024, 05:24:22 UTC)
Source: CVE Database V5
Vendor/Project: zealopensource
Product: Accept Stripe Payments Using Contact Form 7

Description

CVE-2024-12255 is a medium-severity information exposure vulnerability in the WordPress plugin 'Accept Stripe Payments Using Contact Form 7' by zealopensource. The vulnerability exists in all versions up to 2. 5 via the cf7sa-info. php file, which returns phpinfo() data to unauthenticated users. This exposure reveals sensitive configuration details that could aid attackers in crafting further attacks. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, the disclosure of internal server and environment information poses a risk to confidentiality. Organizations using this plugin should prioritize patching or mitigating exposure to prevent potential exploitation. The CVSS score is 5. 3, reflecting a medium risk primarily due to information disclosure without direct impact on integrity or availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:46:17 UTC

Technical Analysis

CVE-2024-12255 is an information exposure vulnerability identified in the WordPress plugin 'Accept Stripe Payments Using Contact Form 7' developed by zealopensource. The flaw exists in all plugin versions up to and including 2.5 and is caused by the cf7sa-info.php file, which outputs the phpinfo() function data without any access restrictions. The phpinfo() output includes detailed information about the server environment, PHP configuration, loaded modules, environment variables, and other sensitive data. Because this file is accessible without authentication, any remote attacker can retrieve this information simply by accessing the vulnerable endpoint. This exposure can reveal critical details such as server paths, software versions, installed extensions, and environment variables that may contain credentials or tokens. Attackers can leverage this information to identify further vulnerabilities, misconfigurations, or to craft targeted attacks such as privilege escalation, code injection, or lateral movement within the affected infrastructure. The vulnerability does not allow direct modification of data or denial of service but compromises confidentiality. The CVSS v3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact. No patches or official fixes have been linked yet, and no exploits have been reported in the wild as of the publication date. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information) and CWE-732 (Incorrect Permission Assignment for Critical Resource).

Potential Impact

The primary impact of CVE-2024-12255 is the unauthorized disclosure of sensitive server and application configuration information. This can facilitate further attacks by providing attackers with insights into the environment, such as software versions, enabled modules, server paths, and potentially sensitive environment variables. Organizations using the affected plugin in their WordPress sites, especially those handling payment processing via Stripe, risk exposing information that could be used to bypass security controls or escalate privileges. While the vulnerability does not directly compromise data integrity or availability, the confidentiality breach can lead to more severe attacks, including targeted exploitation of other vulnerabilities or credential theft. This risk is particularly significant for e-commerce websites and businesses relying on WordPress plugins for payment processing, as attackers may combine this information with other attack vectors to compromise customer data or payment transactions. The lack of authentication and user interaction requirements means the vulnerability can be exploited easily by remote attackers scanning for vulnerable endpoints. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

To mitigate CVE-2024-12255, organizations should immediately restrict access to the cf7sa-info.php file by implementing web server access controls such as IP whitelisting or authentication requirements to prevent unauthenticated access. If possible, disable or remove the cf7sa-info.php file entirely from the plugin directory to eliminate the exposure vector. Monitor web server logs for any access attempts to this file to detect potential reconnaissance activity. Update the plugin to a patched version once available from the vendor or consider temporarily disabling the plugin if it is not critical to operations. Employ web application firewalls (WAFs) to block requests targeting the vulnerable endpoint. Conduct a thorough review of server and application configurations to ensure no other sensitive information is exposed inadvertently. Additionally, review environment variables and configuration files for sensitive data and rotate any credentials or tokens that may have been exposed. Implement a defense-in-depth strategy by hardening the WordPress environment, including limiting plugin usage to trusted sources and regularly auditing installed plugins for vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-05T16:18:55.747Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e33b7ef31ef0b597a1f

Added to database: 2/25/2026, 9:48:35 PM

Last enriched: 2/26/2026, 5:46:17 AM

Last updated: 2/26/2026, 7:39:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats