CVE-2024-12427

The Multi Step Form plugin for WordPress is vulnerable to unauthorized limited file upload due to a missing capability check on the fw_upload_file AJAX action in all versions up to, and including, 1.7.23. This makes it possible for unauthenticated attackers to upload limited file types such as images.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mondula:multi_step_form:*:*:*:*:*:wordpress:*:*

History

03 Mar 2025, 17:42

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3219723%40multi-step-form&new=3219723%40multi-step-form&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3219723%40multi-step-form&new=3219723%40multi-step-form&sfp_email=&sfph_mail= - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/f0a31fee-ccc2-4c3b-b198-6cb750188113?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/f0a31fee-ccc2-4c3b-b198-6cb750188113?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L100 - () https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L100 - Product
References () https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L30 - () https://plugins.trac.wordpress.org/browser/multi-step-form/tags/1.7.22/includes/lib/msf-shortcode.class.php#L30 - Product
First Time Mondula
Mondula multi Step Form
CPE cpe:2.3:a:mondula:multi_step_form:*:*:*:*:*:wordpress:*:*

16 Jan 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-16 10:15

Updated : 2025-03-03 17:42


NVD link : CVE-2024-12427

Mitre link : CVE-2024-12427


JSON object : View

Products Affected

mondula

  • multi_step_form
CWE
CWE-862

Missing Authorization