CVE-2024-6312: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in funnelforms Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free
CVE-2024-6312 is a path traversal vulnerability in the Funnelforms Free WordPress plugin (up to version 3. 7. 3. 2) that allows unauthenticated attackers to delete arbitrary files via the 'af2DeleteFontFile' function. The plugin fails to properly validate file paths before deletion, enabling attackers to target critical files such as wp-config. php. Exploitation requires no user interaction but does require some level of privileges (PR:H) according to the CVSS vector, indicating that the attacker must have some authenticated access. Successful exploitation can lead to site takeover and remote code execution due to deletion of essential configuration files. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to affected WordPress sites using this plugin. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2024-6312 is a path traversal vulnerability classified under CWE-22 found in the Funnelforms Free plugin for WordPress, specifically affecting all versions up to 3.7.3.2. The vulnerability arises from improper validation of file paths in the 'af2DeleteFontFile' function, which is responsible for deleting font files. Due to insufficient checks, an attacker can craft malicious input to traverse directories and delete arbitrary files on the server, including critical WordPress files such as wp-config.php. The deletion of wp-config.php can disrupt site configuration, potentially leading to site downtime or enabling further exploitation such as remote code execution or full site takeover. According to the CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H), the attack can be performed remotely over the network with low attack complexity but requires high privileges (authenticated user with elevated rights). No user interaction is needed, and the impact affects integrity and availability but not confidentiality. Although no public exploits have been reported yet, the vulnerability is significant due to the widespread use of WordPress and the popularity of the Funnelforms plugin. The lack of patch links suggests that a fix may not yet be available, increasing the urgency for mitigation.
Potential Impact
The vulnerability allows attackers to delete arbitrary files on the web server hosting the WordPress site, which can severely impact the integrity and availability of the affected system. Deletion of critical files like wp-config.php can cause site outages, loss of configuration, and enable attackers to gain further control over the site, potentially leading to remote code execution and full site compromise. Organizations relying on the affected plugin risk service disruption, data loss, and reputational damage. Since WordPress powers a significant portion of websites globally, the impact can be widespread, especially for sites that do not have robust access controls or monitoring. The requirement for high privileges limits exploitation to users with some authenticated access, but insider threats or compromised accounts could exploit this vulnerability to escalate damage. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is public.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Funnelforms Free plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. If removal is not feasible, restrict access to the plugin’s administrative functions to trusted users only and implement strict file system permissions to prevent unauthorized file deletions. Web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting path traversal patterns targeting the 'af2DeleteFontFile' function. Monitoring file integrity, especially for critical files like wp-config.php, can provide early detection of exploitation attempts. Additionally, enforce strong authentication and limit user privileges to reduce the risk posed by authenticated attackers. Stay alert for official patches or updates from the vendor and apply them promptly once available.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-6312: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in funnelforms Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free
Description
CVE-2024-6312 is a path traversal vulnerability in the Funnelforms Free WordPress plugin (up to version 3. 7. 3. 2) that allows unauthenticated attackers to delete arbitrary files via the 'af2DeleteFontFile' function. The plugin fails to properly validate file paths before deletion, enabling attackers to target critical files such as wp-config. php. Exploitation requires no user interaction but does require some level of privileges (PR:H) according to the CVSS vector, indicating that the attacker must have some authenticated access. Successful exploitation can lead to site takeover and remote code execution due to deletion of essential configuration files. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to affected WordPress sites using this plugin. The CVSS score is 6.
AI-Powered Analysis
Technical Analysis
CVE-2024-6312 is a path traversal vulnerability classified under CWE-22 found in the Funnelforms Free plugin for WordPress, specifically affecting all versions up to 3.7.3.2. The vulnerability arises from improper validation of file paths in the 'af2DeleteFontFile' function, which is responsible for deleting font files. Due to insufficient checks, an attacker can craft malicious input to traverse directories and delete arbitrary files on the server, including critical WordPress files such as wp-config.php. The deletion of wp-config.php can disrupt site configuration, potentially leading to site downtime or enabling further exploitation such as remote code execution or full site takeover. According to the CVSS 3.1 vector (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H), the attack can be performed remotely over the network with low attack complexity but requires high privileges (authenticated user with elevated rights). No user interaction is needed, and the impact affects integrity and availability but not confidentiality. Although no public exploits have been reported yet, the vulnerability is significant due to the widespread use of WordPress and the popularity of the Funnelforms plugin. The lack of patch links suggests that a fix may not yet be available, increasing the urgency for mitigation.
Potential Impact
The vulnerability allows attackers to delete arbitrary files on the web server hosting the WordPress site, which can severely impact the integrity and availability of the affected system. Deletion of critical files like wp-config.php can cause site outages, loss of configuration, and enable attackers to gain further control over the site, potentially leading to remote code execution and full site compromise. Organizations relying on the affected plugin risk service disruption, data loss, and reputational damage. Since WordPress powers a significant portion of websites globally, the impact can be widespread, especially for sites that do not have robust access controls or monitoring. The requirement for high privileges limits exploitation to users with some authenticated access, but insider threats or compromised accounts could exploit this vulnerability to escalate damage. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is public.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Funnelforms Free plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. If removal is not feasible, restrict access to the plugin’s administrative functions to trusted users only and implement strict file system permissions to prevent unauthorized file deletions. Web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting path traversal patterns targeting the 'af2DeleteFontFile' function. Monitoring file integrity, especially for critical files like wp-config.php, can provide early detection of exploitation attempts. Additionally, enforce strong authentication and limit user privileges to reduce the risk posed by authenticated attackers. Stay alert for official patches or updates from the vendor and apply them promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-25T12:47:35.182Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c00b7ef31ef0b55ed68
Added to database: 2/25/2026, 9:39:12 PM
Last enriched: 2/26/2026, 3:07:36 AM
Last updated: 2/26/2026, 6:16:57 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.