Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4319: CWE-862 Missing Authorization in vsourz1td Advanced Contact form 7 DB

0
Medium
VulnerabilityCVE-2024-4319cvecve-2024-4319cwe-862
Published: Tue Jun 11 2024 (06/11/2024, 05:33:40 UTC)
Source: CVE Database V5
Vendor/Project: vsourz1td
Product: Advanced Contact form 7 DB

Description

CVE-2024-4319 is a medium severity vulnerability in the Advanced Contact form 7 DB WordPress plugin (versions up to 2. 0. 2) caused by missing authorization checks in the 'vsz_cf7_export_to_excel' function. This flaw allows unauthenticated attackers to download submitted form entry data without any privilege or user interaction. The vulnerability impacts confidentiality but does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using this plugin risk unauthorized data disclosure from contact form submissions. Mitigation involves updating the plugin once a patch is available or restricting access to the export functionality via web server rules. Countries with large WordPress user bases and significant adoption of this plugin, including the United States, India, Brazil, Germany, and the United Kingdom, are most at risk. Given the ease of exploitation and data exposure potential, this vulnerability requires prompt attention but is not critical in severity.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:35:40 UTC

Technical Analysis

CVE-2024-4319 is a vulnerability identified in the Advanced Contact form 7 DB plugin for WordPress, maintained by vsourz1td. The issue stems from a missing authorization check in the 'vsz_cf7_export_to_excel' function, which is responsible for exporting submitted form entries to Excel format. This function does not verify whether the requester has the necessary capabilities or permissions, allowing any unauthenticated user to invoke it and download sensitive form submission data. The vulnerability affects all plugin versions up to and including 2.0.2. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the network attack vector, no required privileges, and no user interaction needed. The impact is limited to confidentiality as attackers can access data but cannot modify or disrupt the system. No patches or fixes have been published yet, and no exploits have been observed in the wild. The vulnerability falls under CWE-862 (Missing Authorization), a common security weakness where access control checks are omitted or improperly implemented. This flaw exposes potentially sensitive user-submitted data collected via contact forms, which may include personal information, depending on the form's configuration. Since WordPress is widely used globally and this plugin is popular for managing contact form data, the vulnerability poses a significant risk to organizations relying on it for data collection and storage.

Potential Impact

The primary impact of CVE-2024-4319 is unauthorized disclosure of sensitive data submitted through contact forms. Attackers can remotely and anonymously download all stored form entries, potentially exposing personal identifiable information (PII), business contact details, or other confidential data. This breach of confidentiality can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), reputational damage, and potential follow-on attacks such as phishing or social engineering. Since the vulnerability does not affect data integrity or availability, the risk is confined to data leakage. However, the ease of exploitation—requiring no authentication or user interaction—makes it a significant threat for organizations using the affected plugin. The lack of known exploits in the wild suggests limited active exploitation currently, but the vulnerability could be targeted once widely publicized or automated exploit tools emerge. Organizations with high volumes of sensitive form submissions or those in regulated industries face greater risk.

Mitigation Recommendations

1. Monitor the vendor's communications and WordPress plugin repository for an official patch or update addressing this vulnerability and apply it promptly. 2. Until a patch is available, restrict access to the export functionality by implementing web server-level access controls (e.g., IP whitelisting, authentication requirements) on the relevant plugin endpoints or URLs. 3. Disable or remove the Advanced Contact form 7 DB plugin if it is not essential or replace it with alternative plugins that have proper authorization controls. 4. Review and audit stored form data for any unauthorized access or exfiltration signs. 5. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the export function. 6. Educate site administrators about the risks of installing plugins without proper security reviews and encourage regular plugin updates and security assessments. 7. Consider limiting the amount and sensitivity of data collected via contact forms to reduce exposure in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-29T17:47:47.446Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b86b7ef31ef0b556459

Added to database: 2/25/2026, 9:37:10 PM

Last enriched: 2/26/2026, 12:35:40 AM

Last updated: 2/26/2026, 9:36:35 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats