Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6312: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in funnelforms Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

0
Medium
VulnerabilityCVE-2024-6312cvecve-2024-6312cwe-22
Published: Wed Aug 28 2024 (08/28/2024, 06:43:30 UTC)
Source: CVE Database V5
Vendor/Project: funnelforms
Product: Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

Description

CVE-2024-6312 is a path traversal vulnerability in the Funnelforms Free WordPress plugin (up to version 3. 7. 3. 2) that allows unauthenticated attackers to delete arbitrary files via the 'af2DeleteFontFile' function. The plugin fails to properly validate file paths before deletion, enabling attackers to target critical files such as wp-config. php. Exploitation requires no user interaction but does require some level of privileges (PR:H) according to the CVSS vector, indicating that the attacker must have some authenticated access. Successful exploitation can lead to site takeover and remote code execution due to deletion of essential configuration files. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to affected WordPress sites using this plugin. The CVSS score is 6.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:07:36 UTC

Technical Analysis

CVE-2024-6312 is a path traversal vulnerability classified under CWE-22 found in the Funnelforms Free plugin for WordPress, specifically affecting all versions up to 3.7.3.2. The vulnerability arises from improper validation of file paths in the 'af2DeleteFontFile' function, which is responsible for deleting font files. Due to insufficient checks, an attacker can craft malicious input to traverse directories and delete arbitrary files on the server, including critical WordPress files such as wp-config.php. The deletion of wp-config.php can disrupt site configuration, potentially leading to site downtime or enabling further exploitation such as remote code execution or full site takeover. According to the CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H), the attack can be performed remotely over the network with low attack complexity but requires high privileges (authenticated user with elevated rights). No user interaction is needed, and the impact affects integrity and availability but not confidentiality. Although no public exploits have been reported yet, the vulnerability is significant due to the widespread use of WordPress and the popularity of the Funnelforms plugin. The lack of patch links suggests that a fix may not yet be available, increasing the urgency for mitigation.

Potential Impact

The vulnerability allows attackers to delete arbitrary files on the web server hosting the WordPress site, which can severely impact the integrity and availability of the affected system. Deletion of critical files like wp-config.php can cause site outages, loss of configuration, and enable attackers to gain further control over the site, potentially leading to remote code execution and full site compromise. Organizations relying on the affected plugin risk service disruption, data loss, and reputational damage. Since WordPress powers a significant portion of websites globally, the impact can be widespread, especially for sites that do not have robust access controls or monitoring. The requirement for high privileges limits exploitation to users with some authenticated access, but insider threats or compromised accounts could exploit this vulnerability to escalate damage. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is public.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the Funnelforms Free plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. If removal is not feasible, restrict access to the plugin’s administrative functions to trusted users only and implement strict file system permissions to prevent unauthorized file deletions. Web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting path traversal patterns targeting the 'af2DeleteFontFile' function. Monitoring file integrity, especially for critical files like wp-config.php, can provide early detection of exploitation attempts. Additionally, enforce strong authentication and limit user privileges to reduce the risk posed by authenticated attackers. Stay alert for official patches or updates from the vendor and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-25T12:47:35.182Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c00b7ef31ef0b55ed68

Added to database: 2/25/2026, 9:39:12 PM

Last enriched: 2/26/2026, 3:07:36 AM

Last updated: 2/26/2026, 6:16:57 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats