Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7782: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bitpressadmin Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder

0
High
VulnerabilityCVE-2024-7782cvecve-2024-7782cwe-22
Published: Tue Aug 20 2024 (08/20/2024, 03:21:11 UTC)
Source: CVE Database V5
Vendor/Project: bitpressadmin
Product: Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder

Description

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the iconRemove function in versions 2.0 to 2.13.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 01:59:32 UTC

Technical Analysis

CVE-2024-7782 is a path traversal vulnerability categorized under CWE-22 affecting the 'Contact Form by Bit Form' WordPress plugin, specifically versions 2.0 through 2.13.4. The vulnerability arises from insufficient validation of file paths in the iconRemove function, which is responsible for deleting icon files associated with contact forms. Authenticated attackers with Administrator or higher privileges can exploit this flaw to delete arbitrary files on the web server by manipulating the file path parameter. This arbitrary file deletion can be leveraged to remove critical configuration files such as wp-config.php, which contains database credentials and other sensitive configuration data. Deletion of such files can lead to denial of service or facilitate remote code execution by forcing the system into an insecure state or enabling attackers to upload malicious files. The vulnerability does not require user interaction but does require elevated privileges, limiting exploitation to users who already have significant access. The CVSS v3.1 base score of 8.7 reflects the network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change due to impact beyond the vulnerable component. Although no known exploits have been reported in the wild, the vulnerability poses a serious risk to WordPress sites using this plugin, especially those with multiple administrators or compromised admin accounts. The lack of available patches at the time of disclosure increases urgency for mitigation.

Potential Impact

The impact of CVE-2024-7782 is substantial for organizations using the affected WordPress plugin. Successful exploitation allows attackers to delete arbitrary files on the web server, which can disrupt website availability and integrity. Critical files like wp-config.php contain database credentials and configuration settings; their deletion can cause site outages and enable attackers to gain further control, potentially leading to remote code execution. This compromises the confidentiality, integrity, and availability of the affected systems. Organizations relying on this plugin for contact forms, payment processing, or multi-step forms risk service disruption, data loss, and full server compromise if exploited. The requirement for administrator-level access limits the attack surface but also means that compromised admin accounts or insider threats can leverage this vulnerability for significant damage. The vulnerability could be used as part of a broader attack chain to pivot into deeper network layers or exfiltrate sensitive data. Given WordPress’s widespread use globally, the threat can affect a large number of websites, including e-commerce, corporate, and government sites.

Mitigation Recommendations

1. Immediately update the 'Contact Form by Bit Form' plugin to a patched version once available from the vendor. 2. In the absence of an official patch, restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as MFA to reduce risk of compromised admin accounts. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting path traversal or file deletion patterns targeting the iconRemove function. 4. Regularly back up critical WordPress files, including wp-config.php and other configuration files, to enable rapid recovery in case of file deletion. 5. Conduct thorough audits of administrator accounts and remove unnecessary privileges to minimize the number of users who can exploit this vulnerability. 6. Monitor server logs for unusual file deletion activity or errors related to missing files. 7. Employ file integrity monitoring tools to detect unauthorized changes or deletions of critical files. 8. Consider isolating WordPress instances in containerized or sandboxed environments to limit the blast radius of potential exploitation. 9. Educate administrators about the risks of this vulnerability and the importance of cautious plugin management and access control.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-13T23:15:01.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c1eb7ef31ef0b56026e

Added to database: 2/25/2026, 9:39:42 PM

Last enriched: 2/28/2026, 1:59:32 AM

Last updated: 4/11/2026, 11:26:46 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses