Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13450: CWE-918 Server-Side Request Forgery (SSRF) in bitpressadmin Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder

0
Low
VulnerabilityCVE-2024-13450cvecve-2024-13450cwe-918
Published: Sat Jan 25 2025 (01/25/2025, 08:23:15 UTC)
Source: CVE Database V5
Vendor/Project: bitpressadmin
Product: Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder

Description

CVE-2024-13450 is a Server-Side Request Forgery (SSRF) vulnerability found in the WordPress plugin 'Contact Form by Bit Form' up to version 2. 17. 4. It affects the Webhooks integration feature and requires an attacker to have Administrator-level access or higher. Exploiting this vulnerability allows the attacker to make arbitrary web requests from the server hosting the vulnerable plugin, potentially accessing or modifying internal services. The vulnerability also impacts WordPress Multisite environments. Although the CVSS score is low (3. 8), the risk is limited to authenticated high-privilege users, and no known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network reconnaissance or data manipulation via SSRF.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:58:04 UTC

Technical Analysis

CVE-2024-13450 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting the 'Contact Form by Bit Form' WordPress plugin developed by bitpressadmin. This plugin provides multi-step forms, calculation forms, payment forms, and custom contact form building capabilities. The vulnerability exists in all versions up to and including 2.17.4 and is triggered via the Webhooks integration feature. An authenticated attacker with Administrator privileges or higher can exploit this flaw to make arbitrary HTTP requests originating from the web server hosting the plugin. This can be leveraged to interact with internal services that are otherwise inaccessible externally, potentially leading to unauthorized data access or modification. The vulnerability also extends to WordPress Multisite setups, increasing the scope of impact in such environments. The CVSS v3.1 base score is 3.8, reflecting low severity due to the requirement for high privileges and no user interaction needed. No public exploits have been reported yet, but the risk remains for insider threats or compromised admin accounts. The lack of available patches at the time of reporting necessitates immediate attention from administrators to mitigate potential risks.

Potential Impact

The primary impact of CVE-2024-13450 is the potential for an attacker with Administrator-level access to perform SSRF attacks, enabling them to send crafted requests from the vulnerable server to internal or external systems. This can lead to unauthorized access to internal services, data leakage, or manipulation of internal APIs that are not exposed externally. While the vulnerability does not directly allow remote code execution or denial of service, it can be a stepping stone for further attacks within the internal network. In multisite WordPress environments, the impact is amplified as multiple sites could be affected simultaneously. Organizations relying on this plugin for critical contact forms or payment processing may face confidentiality and integrity risks if the vulnerability is exploited. However, the requirement for high privilege limits the threat to scenarios where an attacker has already gained significant access, such as compromised administrator credentials or insider threats.

Mitigation Recommendations

1. Immediately update the 'Contact Form by Bit Form' plugin to a version that addresses this vulnerability once available. Monitor the vendor's announcements for patches. 2. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Disable or limit the use of the Webhooks integration feature if it is not essential, as this is the attack vector. 4. Implement network segmentation and firewall rules to restrict the web server's ability to make outbound requests to internal services that are not required for normal operation. 5. Monitor logs for unusual outbound HTTP requests originating from the web server, which may indicate exploitation attempts. 6. In multisite environments, review and harden site and network administrator roles and permissions to minimize exposure. 7. Conduct regular security audits and vulnerability scans on WordPress installations to detect outdated plugins and potential misconfigurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T01:06:43.819Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e57b7ef31ef0b59ea02

Added to database: 2/25/2026, 9:49:11 PM

Last enriched: 2/26/2026, 12:58:04 AM

Last updated: 2/26/2026, 5:14:38 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats