Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7389: CWE-522 Insufficiently Protected Credentials in wpmudev Forminator – Contact Form, Payment Form & Custom Form Builder

0
High
VulnerabilityCVE-2024-7389cvecve-2024-7389cwe-522
Published: Fri Aug 02 2024 (08/02/2024, 04:29:55 UTC)
Source: CVE Database V5
Vendor/Project: wpmudev
Product: Forminator – Contact Form, Payment Form & Custom Form Builder

Description

CVE-2024-7389 is a high-severity vulnerability in the Forminator WordPress plugin (versions up to 1. 29. 1) that allows unauthenticated attackers to extract the HubSpot integration developer API key. This exposure occurs via the class-forminator-addon-hubspot-wp-api. php file, enabling attackers to make unauthorized changes to the HubSpot integration or access personally identifiable information (PII) of users. The vulnerability is due to insufficient protection of sensitive credentials (CWE-522). Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the impact on confidentiality is high. Organizations using this plugin with HubSpot integration should prioritize patching or mitigating this flaw to prevent data breaches and unauthorized access.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:37:11 UTC

Technical Analysis

CVE-2024-7389 is a vulnerability identified in the Forminator plugin for WordPress, specifically affecting all versions up to and including 1.29.1. The issue arises from insufficient protection of sensitive credentials, classified under CWE-522, within the plugin's HubSpot integration component (class-forminator-addon-hubspot-wp-api.php). This flaw allows unauthenticated remote attackers to extract the developer API key used for HubSpot integration. With access to this key, attackers can manipulate the plugin's integration with HubSpot, potentially altering configurations or extracting personally identifiable information (PII) of users interacting with the plugin forms. The vulnerability is exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the impact on confidentiality and ease of exploitation. No known public exploits have been reported yet, but the exposure of API keys represents a critical risk vector for data leakage and unauthorized system manipulation. The vulnerability affects a widely used WordPress plugin that provides contact, payment, and custom form building capabilities, often integrated with HubSpot for marketing and CRM purposes.

Potential Impact

The primary impact of CVE-2024-7389 is the compromise of confidentiality through unauthorized disclosure of the HubSpot developer API key. This can lead to unauthorized access and manipulation of the HubSpot integration, potentially allowing attackers to extract sensitive user data, including personally identifiable information collected via forms. Organizations relying on this plugin for customer interactions and data collection risk data breaches, loss of customer trust, and regulatory non-compliance (e.g., GDPR, CCPA). Additionally, attackers could alter integration settings, causing disruption or misuse of marketing and CRM workflows. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, affecting any WordPress site using the vulnerable plugin with HubSpot integration enabled. This could lead to widespread data exposure and operational impacts, especially for businesses heavily dependent on HubSpot for customer engagement and data management.

Mitigation Recommendations

To mitigate CVE-2024-7389, organizations should immediately update the Forminator plugin to a version where this vulnerability is patched once available. Until a patch is released, administrators should consider disabling the HubSpot integration within the plugin to prevent exposure of the API key. Restricting access to the plugin files and endpoints, particularly class-forminator-addon-hubspot-wp-api.php, via web application firewalls (WAFs) or server-level access controls can reduce exposure. Monitoring and auditing API key usage within HubSpot for unusual activity is recommended to detect potential compromise. Additionally, rotating the HubSpot developer API key after patching or disabling the integration will invalidate any keys potentially exposed. Employing the principle of least privilege for API keys and ensuring that keys have limited scope and permissions can minimize damage if keys are leaked. Finally, organizations should review their WordPress security posture, including plugin management and vulnerability scanning, to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-01T15:55:43.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c16b7ef31ef0b55fc42

Added to database: 2/25/2026, 9:39:34 PM

Last enriched: 2/26/2026, 3:37:11 AM

Last updated: 2/26/2026, 9:40:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats