Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6311: CWE-434 Unrestricted Upload of File with Dangerous Type in funnelforms Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

0
High
VulnerabilityCVE-2024-6311cvecve-2024-6311cwe-434
Published: Wed Aug 28 2024 (08/28/2024, 06:43:30 UTC)
Source: CVE Database V5
Vendor/Project: funnelforms
Product: Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

Description

CVE-2024-6311 is a high-severity vulnerability in the Funnelforms Free WordPress plugin that allows authenticated users with administrator-level permissions to upload arbitrary files due to missing file type validation in the 'af2_add_font' function. This unrestricted file upload can lead to remote code execution on the affected server. The vulnerability affects all versions up to and including 3. 7. 3. 2. Exploitation requires high privileges but no user interaction beyond authentication. Although no known exploits are currently in the wild, the impact on confidentiality, integrity, and availability is significant. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent potential compromise. The threat primarily targets WordPress sites using this plugin, which are widespread globally, with particular risk in countries with high WordPress adoption.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:07:20 UTC

Technical Analysis

CVE-2024-6311 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Funnelforms Free WordPress plugin, specifically in the 'af2_add_font' function. This function fails to validate file types during upload, allowing authenticated users with administrator or higher privileges to upload arbitrary files to the server. Since the plugin is widely used for creating interactive contact forms and multi-step form builders with drag-and-drop editors, this vulnerability exposes a critical attack vector. The lack of file type validation means attackers can upload malicious scripts or web shells, potentially leading to remote code execution (RCE). The vulnerability affects all versions up to 3.7.3.2, with no patches currently available. The CVSS v3.1 score of 7.2 indicates a high severity, with network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although exploitation requires authenticated admin access, which limits the attack surface, the consequences of a successful exploit are severe, including full system compromise and data breaches. No known exploits have been reported in the wild yet, but the vulnerability represents a significant risk to WordPress sites using this plugin.

Potential Impact

The primary impact of CVE-2024-6311 is the potential for remote code execution on affected WordPress servers, which can lead to complete system compromise. Attackers with administrator privileges can upload malicious files, such as web shells or backdoors, enabling persistent access, data theft, defacement, or use of the server in further attacks. Confidentiality is at risk as sensitive data stored on the server can be exfiltrated. Integrity is compromised because attackers can alter website content or inject malicious code. Availability may also be affected if attackers disrupt services or deploy ransomware. Organizations relying on the Funnelforms Free plugin face increased risk of targeted attacks, especially if administrator credentials are compromised through phishing or other means. The vulnerability's exploitation could also facilitate lateral movement within networks, escalating the threat beyond the initial WordPress environment. Given the widespread use of WordPress globally, the potential scale of impact is substantial, particularly for organizations with high-value web assets or sensitive customer data.

Mitigation Recommendations

Since no official patches are currently available, organizations should take immediate steps to mitigate the risk. First, restrict administrator access to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Disable or remove the Funnelforms Free plugin if it is not essential to reduce the attack surface. If the plugin is necessary, monitor file upload directories for suspicious files and implement web application firewalls (WAFs) with rules to detect and block malicious file uploads or execution attempts. Regularly audit administrator accounts and review logs for unusual activity. Consider deploying intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts. Additionally, isolate WordPress environments from critical backend systems to limit lateral movement. Stay informed about vendor updates and apply patches promptly once released. Finally, conduct regular backups and ensure recovery plans are tested to minimize downtime in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-25T12:47:23.304Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c00b7ef31ef0b55ed63

Added to database: 2/25/2026, 9:39:12 PM

Last enriched: 2/26/2026, 3:07:20 AM

Last updated: 2/26/2026, 8:06:59 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats