Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3870: CWE-200 Information Exposure in arshidkv12 Contact Form 7 Database Addon – CFDB7

0
Medium
VulnerabilityCVE-2024-3870cvecve-2024-3870cwe-200
Published: Thu May 02 2024 (05/02/2024, 16:52:26 UTC)
Source: CVE Database V5
Vendor/Project: arshidkv12
Product: Contact Form 7 Database Addon – CFDB7

Description

CVE-2024-3870 is a medium severity vulnerability in the Contact Form 7 Database Addon – CFDB7 WordPress plugin, affecting all versions up to 1. 2. 6. 8. It allows unauthenticated attackers to exploit the cfdb7_before_send_mail function to access sensitive information, including Personally Identifiable Information (PII) from user-uploaded files. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the exposure of sensitive data poses privacy and compliance risks. Organizations using this plugin should prioritize updating or applying mitigations to prevent unauthorized data disclosure. The vulnerability primarily impacts WordPress sites using this plugin, which are prevalent globally but especially in countries with high WordPress adoption. Mitigation involves removing or restricting access to the vulnerable function, monitoring for suspicious activity, and applying updates once available.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:27:42 UTC

Technical Analysis

CVE-2024-3870 is an information exposure vulnerability classified under CWE-200, found in the Contact Form 7 Database Addon – CFDB7 WordPress plugin developed by arshidkv12. This vulnerability exists in versions up to and including 1.2.6.8 and is triggered via the cfdb7_before_send_mail function. The flaw allows unauthenticated remote attackers to extract sensitive data, including Personally Identifiable Information (PII), from files uploaded by users through the contact form. The vulnerability arises because the plugin fails to properly restrict access to sensitive data before sending emails, enabling attackers to retrieve data without authentication or user interaction. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality, with no effect on integrity or availability. No patches or fixes are currently published, and no known exploits have been observed in the wild. The vulnerability affects all versions of the plugin, which is widely used in WordPress environments to store and manage contact form submissions. Given the plugin’s popularity, this vulnerability poses a significant risk of sensitive data leakage if exploited.

Potential Impact

The primary impact of CVE-2024-3870 is unauthorized disclosure of sensitive information, including Personally Identifiable Information (PII), which can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), and reputational damage. Organizations relying on the CFDB7 plugin to store user-submitted data risk exposure of confidential customer or employee data. Although the vulnerability does not affect system integrity or availability, the confidentiality breach can facilitate further attacks such as identity theft, phishing, or social engineering. Since the exploit requires no authentication or user interaction, attackers can remotely and anonymously harvest sensitive data at scale. This risk is particularly acute for organizations handling sensitive customer information or operating in regulated industries. The lack of a patch increases the window of exposure, and the widespread use of WordPress and this plugin amplifies the potential attack surface globally.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Disable or remove the Contact Form 7 Database Addon – CFDB7 plugin if it is not essential; 2) Restrict access to the cfdb7_before_send_mail function by applying web application firewall (WAF) rules to block unauthorized requests targeting this functionality; 3) Limit file upload types and sizes to reduce sensitive data exposure; 4) Monitor web server and application logs for unusual access patterns or attempts to exploit the vulnerability; 5) Implement strict access controls and ensure least privilege on WordPress admin and plugin management; 6) Regularly back up data and review data retention policies to minimize stored sensitive information; 7) Once a patch is available, promptly update the plugin to the fixed version; 8) Educate site administrators about the risks and signs of exploitation. These steps go beyond generic advice by focusing on immediate risk reduction and proactive monitoring specific to this vulnerability’s attack vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-16T00:17:43.172Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c9fb7ef31ef0b566ed0

Added to database: 2/25/2026, 9:41:51 PM

Last enriched: 2/26/2026, 6:27:42 AM

Last updated: 2/26/2026, 11:19:43 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats