vulnerability
WordPress Plugin: bit-form: CVE-2024-13451: Exposure of Sensitive Information to an Unauthorized Actor
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Jul 1, 2025 | Jul 2, 2025 | Jul 9, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Jul 1, 2025
Added
Jul 2, 2025
Modified
Jul 9, 2025
Description
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form and Custom Contact Form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.17.4 via file uploads due to insufficient directory listing prevention and lack of randomization of file names. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via a form. The vulnerability was partially patched in version 2.17.5.
Solution
bit-form-plugin-cve-2024-13451
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.