CVE-2024-9352: CWE-352 Cross-Site Request Forgery (CSRF) in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder
CVE-2024-9352 is a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin Forminator Forms – Contact Form, Payment Form & Custom Form Builder affecting all versions up to 1. 35. 1. The flaw arises from missing or incorrect nonce validation in the custom form 'create_module' function, allowing unauthenticated attackers to trick site administrators into creating draft forms via forged requests. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts the integrity of the affected WordPress sites by enabling unauthorized form creation but does not affect confidentiality or availability. No known exploits are currently reported in the wild. The CVSS v3. 1 base score is 4. 3, indicating medium severity.
AI Analysis
Technical Summary
CVE-2024-9352 is a medium-severity CSRF vulnerability identified in the Forminator Forms plugin for WordPress, which is widely used for creating contact, payment, and custom forms. The vulnerability exists in all versions up to and including 1.35.1 due to missing or improper nonce validation in the 'create_module' function responsible for creating new forms. Nonce tokens are security measures designed to prevent CSRF attacks by ensuring that requests originate from legitimate users. The absence or incorrect implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, if an administrator clicks on a specially crafted link, results in the creation of unauthorized draft forms on the site. Although the attacker cannot directly execute actions without user interaction, the ability to create draft forms could be leveraged for further attacks such as phishing or injecting malicious content if combined with other vulnerabilities or social engineering. The vulnerability does not affect confidentiality or availability directly but compromises the integrity of the site’s form management. The CVSS score of 4.3 reflects the attack vector as network-based with low complexity and no privileges required, but user interaction is necessary. No patches or exploits are currently publicly available, but the risk remains significant for sites with administrative users who might be targeted with social engineering. The plugin’s popularity in the WordPress ecosystem means a large number of sites could be affected globally.
Potential Impact
The primary impact of CVE-2024-9352 is the unauthorized creation of draft forms on affected WordPress sites, which compromises the integrity of site content and form management. Attackers could use this capability to insert malicious forms for phishing, data collection, or to facilitate further attacks such as malware distribution or privilege escalation if combined with other vulnerabilities. While the vulnerability does not directly expose sensitive data or cause denial of service, the potential for social engineering and subsequent exploitation poses a risk to organizational security posture. Organizations relying on Forminator Forms for critical customer interactions or payment processing could face reputational damage and potential financial loss if attackers leverage this flaw. The requirement for administrator interaction limits the ease of exploitation but does not eliminate risk, especially in environments with high administrative activity or where administrators are targeted by phishing campaigns. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability should be treated proactively to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2024-9352, organizations should immediately update the Forminator Forms plugin to a version that addresses the nonce validation issue once available. Until a patch is released, administrators should implement strict access controls to limit administrative user exposure and educate administrators about the risks of clicking untrusted links. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting form creation endpoints can reduce risk. Additionally, enabling multi-factor authentication (MFA) for WordPress administrative accounts can help prevent unauthorized access even if social engineering is attempted. Regularly auditing installed plugins and monitoring administrative actions for anomalies can provide early detection of exploitation attempts. Disabling or restricting the use of the vulnerable plugin on sites where it is not essential can also reduce the attack surface. Finally, organizations should maintain up-to-date backups to recover quickly if malicious forms are created or other related compromises occur.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain, South Africa
CVE-2024-9352: CWE-352 Cross-Site Request Forgery (CSRF) in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder
Description
CVE-2024-9352 is a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin Forminator Forms – Contact Form, Payment Form & Custom Form Builder affecting all versions up to 1. 35. 1. The flaw arises from missing or incorrect nonce validation in the custom form 'create_module' function, allowing unauthenticated attackers to trick site administrators into creating draft forms via forged requests. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts the integrity of the affected WordPress sites by enabling unauthorized form creation but does not affect confidentiality or availability. No known exploits are currently reported in the wild. The CVSS v3. 1 base score is 4. 3, indicating medium severity.
AI-Powered Analysis
Technical Analysis
CVE-2024-9352 is a medium-severity CSRF vulnerability identified in the Forminator Forms plugin for WordPress, which is widely used for creating contact, payment, and custom forms. The vulnerability exists in all versions up to and including 1.35.1 due to missing or improper nonce validation in the 'create_module' function responsible for creating new forms. Nonce tokens are security measures designed to prevent CSRF attacks by ensuring that requests originate from legitimate users. The absence or incorrect implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, if an administrator clicks on a specially crafted link, results in the creation of unauthorized draft forms on the site. Although the attacker cannot directly execute actions without user interaction, the ability to create draft forms could be leveraged for further attacks such as phishing or injecting malicious content if combined with other vulnerabilities or social engineering. The vulnerability does not affect confidentiality or availability directly but compromises the integrity of the site’s form management. The CVSS score of 4.3 reflects the attack vector as network-based with low complexity and no privileges required, but user interaction is necessary. No patches or exploits are currently publicly available, but the risk remains significant for sites with administrative users who might be targeted with social engineering. The plugin’s popularity in the WordPress ecosystem means a large number of sites could be affected globally.
Potential Impact
The primary impact of CVE-2024-9352 is the unauthorized creation of draft forms on affected WordPress sites, which compromises the integrity of site content and form management. Attackers could use this capability to insert malicious forms for phishing, data collection, or to facilitate further attacks such as malware distribution or privilege escalation if combined with other vulnerabilities. While the vulnerability does not directly expose sensitive data or cause denial of service, the potential for social engineering and subsequent exploitation poses a risk to organizational security posture. Organizations relying on Forminator Forms for critical customer interactions or payment processing could face reputational damage and potential financial loss if attackers leverage this flaw. The requirement for administrator interaction limits the ease of exploitation but does not eliminate risk, especially in environments with high administrative activity or where administrators are targeted by phishing campaigns. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability should be treated proactively to prevent future attacks.
Mitigation Recommendations
To mitigate CVE-2024-9352, organizations should immediately update the Forminator Forms plugin to a version that addresses the nonce validation issue once available. Until a patch is released, administrators should implement strict access controls to limit administrative user exposure and educate administrators about the risks of clicking untrusted links. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting form creation endpoints can reduce risk. Additionally, enabling multi-factor authentication (MFA) for WordPress administrative accounts can help prevent unauthorized access even if social engineering is attempted. Regularly auditing installed plugins and monitoring administrative actions for anomalies can provide early detection of exploitation attempts. Disabling or restricting the use of the vulnerable plugin on sites where it is not essential can also reduce the attack surface. Finally, organizations should maintain up-to-date backups to recover quickly if malicious forms are created or other related compromises occur.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-09-30T16:52:08.073Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b49b7ef31ef0b550ecc
Added to database: 2/25/2026, 9:36:09 PM
Last enriched: 2/25/2026, 11:16:51 PM
Last updated: 2/26/2026, 7:25:21 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.