S4E

CVE-2024-2771 Scanner

CVE-2024-2771 Scanner - Privilege Escalation vulnerability in Contact Form Plugin by Fluent Forms

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

16 days 22 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

This scanner is designed for the Contact Form Plugin by Fluent Forms, a popular WordPress plugin used by website owners to create contact forms with ease. Website administrators and developers commonly leverage this plugin to enhance user interaction and collect visitor information efficiently. It provides users with a variety of configurations and customizations suited for diverse communication needs within websites. The plugin aims to integrate seamlessly with WordPress, offering an intuitive interface and an array of features to streamline form creation and management. Its widespread usage in the digital ecosystem makes it crucial to address vulnerabilities promptly to safeguard user data.

This vulnerability centers on a privilege escalation flaw due to an absent capability check on the REST API endpoint of the plugin. It allows unauthenticated attackers to exploit the API, enabling them to assign management permissions beyond intended limits. Such access grants them the ability to delve into plugin settings and features unauthorizedly, thereby heightening security risks. The flaw exists in versions of the plugin before 5.1.17, permitting potential manipulation of user privileges and compromising the security posture of the affected WordPress installations.

Technical details reveal that the vulnerable endpoint is '/wp-json/fluentform/v1/managers', which lacks adequate user access validation. Attackers can target this point with crafted requests to gain extra permissions on the plugin's settings. The flaw primarily involves missing authentication checks, which should restrict user roles to prevent unauthorized privilege allocation. As a result, malicious actors can escalate privileges by modifying specific parameters within the API calls, thus exerting control over sensitive plugin functionalities.

Potential effects of this vulnerability, if exploited, can lead to attackers gaining unwarranted access to various settings and data managed by the plugin, including sensitive user inputs. The exploitation allows unauthorized deletion of manager accounts, jeopardizing the integrity and confidentiality of the website data. Such unauthorized modifications can severely undermine the trustworthiness of the website and potentially lead to additional security breaches affecting user privacy.

REFERENCES

Get started to protecting your digital assets