Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5857: CWE-862 Missing Authorization in funnelforms Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

0
Medium
VulnerabilityCVE-2024-5857cvecve-2024-5857cwe-862
Published: Thu Aug 29 2024 (08/29/2024, 03:30:44 UTC)
Source: CVE Database V5
Vendor/Project: funnelforms
Product: Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

Description

CVE-2024-5857 is a medium severity vulnerability in the Funnelforms Free WordPress plugin, specifically in its Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor. The flaw arises from a missing authorization check on the af2_handel_file_remove AJAX action, allowing unauthenticated attackers to delete arbitrary media files. This vulnerability affects all versions up to and including 3. 7. 3. 2. Exploitation does not require user interaction or authentication, and it impacts availability by enabling denial of service through media file deletion. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or mitigating this issue to prevent potential disruption of website content and functionality.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:51:55 UTC

Technical Analysis

CVE-2024-5857 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Funnelforms Free WordPress plugin, which provides an Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor functionality. The vulnerability exists because the plugin fails to perform a capability check on the af2_handel_file_remove AJAX action. This omission allows unauthenticated attackers to invoke this AJAX endpoint and delete arbitrary media files stored on the WordPress site. Since the vulnerability affects all versions up to and including 3.7.3.2, any site running these versions is susceptible. The attack vector is remote and requires no privileges or user interaction, making exploitation straightforward. The impact is primarily on availability, as attackers can remove media assets, potentially disrupting website operations, content presentation, and user experience. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant risk for affected sites. The vulnerability was published on August 29, 2024, with a CVSS v3.1 score of 5.3, indicating a medium severity level.

Potential Impact

The primary impact of CVE-2024-5857 is the unauthorized deletion of media files, which can lead to partial or complete denial of service for affected WordPress sites using the Funnelforms Free plugin. This can disrupt website functionality, degrade user experience, and potentially cause loss of critical media content such as images, documents, or videos. For organizations relying heavily on their WordPress sites for customer interaction, marketing, or e-commerce, this could result in reputational damage and operational downtime. Since the vulnerability allows unauthenticated remote attackers to delete files, it increases the attack surface significantly. Although it does not directly compromise confidentiality or integrity of data beyond file deletion, the availability impact alone can be costly. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to weaken site defenses or prepare for further exploitation.

Mitigation Recommendations

To mitigate CVE-2024-5857, organizations should immediately update the Funnelforms Free plugin to a version where this vulnerability is patched once available. In the absence of an official patch, administrators can implement the following measures: 1) Restrict access to the AJAX endpoint af2_handel_file_remove by configuring web application firewalls (WAFs) or server rules to block unauthenticated requests targeting this action. 2) Employ strict file permission controls on the media upload directories to limit deletion capabilities. 3) Monitor server logs for suspicious AJAX requests that invoke file deletion actions and respond promptly to anomalies. 4) Consider temporarily disabling the plugin if it is not critical to site operations until a patch is released. 5) Regularly back up media files and site content to enable rapid recovery in case of deletion. 6) Implement least privilege principles for all plugins and user roles to minimize potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-11T13:05:01.436Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf3b7ef31ef0b55cfb8

Added to database: 2/25/2026, 9:38:59 PM

Last enriched: 2/26/2026, 2:51:55 AM

Last updated: 2/26/2026, 11:14:29 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats