Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9352: CWE-352 Cross-Site Request Forgery (CSRF) in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder

0
Medium
VulnerabilityCVE-2024-9352cvecve-2024-9352cwe-352
Published: Thu Oct 17 2024 (10/17/2024, 05:33:08 UTC)
Source: CVE Database V5
Vendor/Project: wpmudev
Product: Forminator Forms – Contact Form, Payment Form & Custom Form Builder

Description

CVE-2024-9352 is a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin Forminator Forms – Contact Form, Payment Form & Custom Form Builder affecting all versions up to 1. 35. 1. The flaw arises from missing or incorrect nonce validation in the custom form 'create_module' function, allowing unauthenticated attackers to trick site administrators into creating draft forms via forged requests. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts the integrity of the affected WordPress sites by enabling unauthorized form creation but does not affect confidentiality or availability. No known exploits are currently reported in the wild. The CVSS v3. 1 base score is 4. 3, indicating medium severity.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:16:51 UTC

Technical Analysis

CVE-2024-9352 is a medium-severity CSRF vulnerability identified in the Forminator Forms plugin for WordPress, which is widely used for creating contact, payment, and custom forms. The vulnerability exists in all versions up to and including 1.35.1 due to missing or improper nonce validation in the 'create_module' function responsible for creating new forms. Nonce tokens are security measures designed to prevent CSRF attacks by ensuring that requests originate from legitimate users. The absence or incorrect implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, if an administrator clicks on a specially crafted link, results in the creation of unauthorized draft forms on the site. Although the attacker cannot directly execute actions without user interaction, the ability to create draft forms could be leveraged for further attacks such as phishing or injecting malicious content if combined with other vulnerabilities or social engineering. The vulnerability does not affect confidentiality or availability directly but compromises the integrity of the site’s form management. The CVSS score of 4.3 reflects the attack vector as network-based with low complexity and no privileges required, but user interaction is necessary. No patches or exploits are currently publicly available, but the risk remains significant for sites with administrative users who might be targeted with social engineering. The plugin’s popularity in the WordPress ecosystem means a large number of sites could be affected globally.

Potential Impact

The primary impact of CVE-2024-9352 is the unauthorized creation of draft forms on affected WordPress sites, which compromises the integrity of site content and form management. Attackers could use this capability to insert malicious forms for phishing, data collection, or to facilitate further attacks such as malware distribution or privilege escalation if combined with other vulnerabilities. While the vulnerability does not directly expose sensitive data or cause denial of service, the potential for social engineering and subsequent exploitation poses a risk to organizational security posture. Organizations relying on Forminator Forms for critical customer interactions or payment processing could face reputational damage and potential financial loss if attackers leverage this flaw. The requirement for administrator interaction limits the ease of exploitation but does not eliminate risk, especially in environments with high administrative activity or where administrators are targeted by phishing campaigns. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability should be treated proactively to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2024-9352, organizations should immediately update the Forminator Forms plugin to a version that addresses the nonce validation issue once available. Until a patch is released, administrators should implement strict access controls to limit administrative user exposure and educate administrators about the risks of clicking untrusted links. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting form creation endpoints can reduce risk. Additionally, enabling multi-factor authentication (MFA) for WordPress administrative accounts can help prevent unauthorized access even if social engineering is attempted. Regularly auditing installed plugins and monitoring administrative actions for anomalies can provide early detection of exploitation attempts. Disabling or restricting the use of the vulnerable plugin on sites where it is not essential can also reduce the attack surface. Finally, organizations should maintain up-to-date backups to recover quickly if malicious forms are created or other related compromises occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-30T16:52:08.073Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b49b7ef31ef0b550ecc

Added to database: 2/25/2026, 9:36:09 PM

Last enriched: 2/25/2026, 11:16:51 PM

Last updated: 2/26/2026, 7:25:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats