Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13498: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in webaways NEX-Forms – Ultimate Form Builder – Contact forms and much more

0
Medium
VulnerabilityCVE-2024-13498cvecve-2024-13498cwe-200
Published: Wed Mar 12 2025 (03/12/2025, 05:22:52 UTC)
Source: CVE Database V5
Vendor/Project: webaways
Product: NEX-Forms – Ultimate Form Builder – Contact forms and much more

Description

CVE-2024-13498 is a medium severity vulnerability in the webaways NEX-Forms WordPress plugin, affecting all versions up to 8. 8. 1. It allows unauthenticated attackers to access sensitive files uploaded via forms due to insufficient directory listing prevention and predictable file names. This exposure can lead to unauthorized disclosure of sensitive user data without requiring authentication or user interaction. The vulnerability impacts confidentiality but does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or applying mitigations to prevent data leakage. The vulnerability is relevant globally but especially critical in countries with high WordPress usage and where this plugin is popular. Mitigations include restricting directory listing, implementing randomized file names, and securing upload directories with proper access controls.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:30:58 UTC

Technical Analysis

CVE-2024-13498 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the NEX-Forms – Ultimate Form Builder WordPress plugin developed by webaways. This plugin, widely used for creating contact forms and other form types, suffers from insufficient protections on uploaded files. Specifically, the plugin does not prevent directory listing on the upload directories and fails to randomize uploaded file names, making it possible for unauthenticated attackers to enumerate and retrieve sensitive files uploaded via forms. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by simply accessing predictable URLs or directory listings. The CVSS 3.1 base score is 5.3 (medium), reflecting the ease of access but limited impact to confidentiality only, with no impact on integrity or availability. The vulnerability affects all versions up to and including 8.8.1. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The root cause lies in insecure handling of file uploads and inadequate web server configuration or plugin safeguards, which allow unauthorized actors to access sensitive user data such as uploaded documents, images, or other files. This exposure can lead to privacy violations and potential data breaches if sensitive information is contained within the uploaded files.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive information, which can include personal data, confidential documents, or other sensitive files uploaded via forms. Organizations using the vulnerable plugin risk data leakage that could violate privacy regulations such as GDPR or HIPAA, depending on the nature of the data exposed. While the vulnerability does not allow modification or deletion of data, the confidentiality breach alone can damage organizational reputation, result in regulatory fines, and erode customer trust. Since exploitation requires no authentication and no user interaction, attackers can automate scanning and data extraction at scale. This makes websites using this plugin attractive targets for opportunistic attackers and data harvesters. The scope includes any WordPress site using the affected versions of NEX-Forms, which could be significant given the plugin's popularity. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's simplicity means it could be weaponized quickly once widely known.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for and apply any available patches or updates from the vendor once released. In the absence of official patches, immediate steps include disabling directory listing on the web server for upload directories via .htaccess or server configuration to prevent enumeration of files. Implementing randomized or non-predictable file names for uploaded files can reduce the risk of direct URL guessing. Restricting access to upload directories using authentication or IP whitelisting where feasible adds an additional layer of protection. Reviewing and tightening file upload handling logic within the plugin or custom code to validate and sanitize file names and paths is critical. Monitoring web server logs for suspicious access patterns to upload directories can help detect exploitation attempts. Finally, organizations should consider alternative form plugins with stronger security postures if timely patching is not possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T21:29:59.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5bb7ef31ef0b59ed7f

Added to database: 2/25/2026, 9:49:15 PM

Last enriched: 2/26/2026, 12:30:58 AM

Last updated: 2/26/2026, 8:07:57 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats