Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37555: Unrestricted Upload of File with Dangerous Type in ZealousWeb Generate PDF using Contact Form 7

0
Unknown
VulnerabilityCVE-2024-37555cvecve-2024-37555
Published: Tue Jul 09 2024 (07/09/2024, 07:21:53 UTC)
Source: CVE Database V5
Vendor/Project: ZealousWeb
Product: Generate PDF using Contact Form 7

Description

Unrestricted Upload of File with Dangerous Type vulnerability in ZealousWeb Generate PDF using Contact Form 7 generate-pdf-using-contact-form-7.This issue affects Generate PDF using Contact Form 7: from n/a through <= 4.1.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 05:15:04 UTC

Technical Analysis

CVE-2024-37555 is an Unrestricted Upload of File with Dangerous Type vulnerability found in the WordPress plugin 'Generate PDF using Contact Form 7' developed by ZealousWeb. This plugin integrates PDF generation capabilities with the widely used Contact Form 7 plugin. The vulnerability affects all versions up to and including 4.1.2. The core issue is that the plugin does not properly restrict or validate the types of files that users can upload through its interface. This lack of validation allows an attacker to upload files with dangerous extensions, such as PHP scripts or other executable code. Once uploaded, these files can be executed on the server, potentially allowing remote code execution (RCE), unauthorized access, data theft, or site defacement. The vulnerability does not require any authentication or user interaction, making it easier for attackers to exploit. Although no known exploits have been reported in the wild yet, the nature of the vulnerability and the popularity of WordPress and Contact Form 7 make it a significant risk. The absence of a CVSS score indicates that the vulnerability is newly disclosed and may not yet have been fully assessed. However, the technical details and context suggest a high-severity threat. The vulnerability is classified as a file upload flaw, a common and dangerous web application security issue. It is critical for site administrators to address this vulnerability promptly to prevent potential compromise.

Potential Impact

The impact of CVE-2024-37555 is potentially severe for organizations running WordPress sites with the affected plugin. Successful exploitation could allow attackers to upload and execute malicious files, leading to remote code execution on the web server. This can result in full site compromise, data breaches, defacement, or use of the compromised server as a pivot point for further attacks within the network. Confidentiality is at risk due to potential data theft, integrity can be compromised through unauthorized modifications, and availability may be affected if the attacker disrupts site operations or deploys ransomware. The ease of exploitation without authentication increases the likelihood of attacks, especially on publicly accessible websites. Organizations in sectors such as e-commerce, finance, healthcare, and government that rely on WordPress for their web presence are particularly vulnerable. The threat also extends to managed service providers hosting multiple client sites using this plugin. Although no active exploits are known, the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available.

Mitigation Recommendations

1. Immediate update: Site administrators should update the 'Generate PDF using Contact Form 7' plugin to the latest version once a patch is released by ZealousWeb. 2. Temporary disablement: If a patch is not yet available, consider disabling the plugin or the file upload functionality within it to prevent exploitation. 3. File upload restrictions: Implement server-side controls to restrict allowed file types and enforce strict MIME type validation at the web server or application firewall level. 4. Web application firewall (WAF): Deploy or update WAF rules to detect and block attempts to upload files with dangerous extensions or suspicious payloads targeting this plugin. 5. File system permissions: Harden file system permissions to prevent execution of uploaded files in directories used for uploads. 6. Monitoring and logging: Enable detailed logging of file upload activities and monitor for unusual or unauthorized uploads. 7. Incident response readiness: Prepare to respond quickly to any signs of compromise, including isolating affected systems and restoring from clean backups. 8. Security awareness: Educate site administrators about the risks of untrusted file uploads and the importance of timely patching. These measures, combined, reduce the risk of exploitation until an official patch is applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-06-09T18:16:58.672Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd745fe6bfc5ba1def6f5a

Added to database: 4/1/2026, 7:39:11 PM

Last enriched: 4/2/2026, 5:15:04 AM

Last updated: 4/6/2026, 9:18:33 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses