Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7447: CWE-862 Missing Authorization in funnelforms Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

0
Medium
VulnerabilityCVE-2024-7447cvecve-2024-7447cwe-862
Published: Wed Aug 28 2024 (08/28/2024, 11:31:24 UTC)
Source: CVE Database V5
Vendor/Project: funnelforms
Product: Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free

Description

CVE-2024-7447 is a medium severity vulnerability in the Funnelforms Free WordPress plugin, allowing unauthenticated attackers to upload arbitrary media files due to a missing authorization check in the file upload handler. This flaw affects all versions up to 3. 7. 3. 2 and does not require user interaction or authentication. Exploitation could lead to unauthorized modification of site data, potentially enabling further attacks such as webshell deployment or defacement. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized file uploads. The vulnerability primarily impacts WordPress sites using this plugin, which may be more prevalent in countries with high WordPress adoption. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:40:46 UTC

Technical Analysis

CVE-2024-7447 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free WordPress plugin. The issue arises from the 'fnsf_af2_handel_file_upload' function lacking proper capability checks, allowing unauthenticated attackers to upload arbitrary media files to the affected WordPress site. This vulnerability affects all versions up to and including 3.7.3.2. Because the upload function does not verify user permissions, attackers can bypass authentication and authorization controls, potentially uploading malicious files such as web shells or other executable content. The vulnerability does not require any user interaction and can be exploited remotely over the network. Although no exploits have been reported in the wild yet, the flaw presents a significant risk because it enables unauthorized data modification, which can be leveraged for further compromise or defacement. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with attack vector as network, no privileges required, and no user interaction needed. The impact affects integrity but not confidentiality or availability directly. The vulnerability is specific to the Funnelforms Free plugin, a tool used to create interactive contact and multi-step forms with drag-and-drop functionality on WordPress sites.

Potential Impact

The primary impact of CVE-2024-7447 is unauthorized modification of website data through arbitrary media uploads. Attackers can upload malicious files such as web shells, backdoors, or defacement content, which can lead to further compromise of the WordPress site and potentially the underlying server. This can result in loss of data integrity, reputational damage, and possible pivoting to other internal systems. Since the vulnerability does not affect confidentiality or availability directly, the risk is mainly related to integrity and potential escalation. Organizations running WordPress sites with this plugin are at risk of unauthorized content injection and persistent compromise. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated attacks. However, the absence of known exploits in the wild suggests that active exploitation is not widespread yet. The impact is more severe for high-profile or high-traffic websites where defacement or malicious uploads can cause significant damage.

Mitigation Recommendations

To mitigate CVE-2024-7447, organizations should immediately update the Funnelforms Free plugin to a patched version once available. Until a patch is released, administrators should consider disabling or removing the plugin if it is not essential. Implementing a Web Application Firewall (WAF) with rules to block unauthorized file upload attempts targeting the vulnerable function can reduce risk. Restricting file upload permissions at the server level and monitoring upload directories for suspicious files can help detect exploitation attempts. Additionally, hardening WordPress installations by limiting plugin usage to trusted and actively maintained plugins reduces exposure. Regularly auditing installed plugins for vulnerabilities and applying principle of least privilege to user roles can further reduce attack surface. Monitoring logs for unusual POST requests to the upload handler endpoint can provide early warning of exploitation attempts. Finally, educating site administrators about this vulnerability and encouraging prompt patching is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-02T22:46:44.738Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c18b7ef31ef0b55fdb5

Added to database: 2/25/2026, 9:39:36 PM

Last enriched: 2/26/2026, 3:40:46 AM

Last updated: 2/26/2026, 9:36:01 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats