CVE-2024-12184

5.3 MEDIUM

📋 TL;DR

This vulnerability in the WordPress Contact Forms by Cimatti plugin allows unauthenticated attackers to download form submissions containing potentially sensitive user data. All WordPress sites using this plugin up to version 1.9.4 are affected. The issue stems from missing authorization checks in a file download function.

💻 Affected Systems

Products:
  • WordPress Contact Forms by Cimatti plugin
Versions: All versions up to and including 1.9.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers exfiltrate sensitive personal data (PII, financial information, credentials) from form submissions, leading to data breaches, regulatory fines, and reputational damage.

🟠

Likely Case

Attackers download form submissions containing names, email addresses, messages, and other user-provided data, potentially enabling phishing, spam, or harassment campaigns.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized downloads are blocked and detected, limiting data exposure to minimal or no sensitive information.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit via direct HTTP requests to the vulnerable endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.5

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3232168/contact-forms

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Contact Forms by Cimatti' and click 'Update Now'. 4. Verify plugin version is 1.9.5 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Contact Forms by Cimatti plugin to prevent exploitation.

wp plugin deactivate contact-forms

Web application firewall rule

all

Block requests to the vulnerable accua_forms_download_submitted_file() endpoint.

Add WAF rule: Block URI path containing 'accua_forms_download_submitted_file'

🧯 If You Can't Patch

  • Disable the Contact Forms by Cimatti plugin immediately.
  • Implement network-level blocking of requests to the vulnerable endpoint using WAF or firewall rules.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Contact Forms by Cimatti' version 1.9.4 or lower.

Check Version:

wp plugin get contact-forms --field=version

Verify Fix Applied:

Confirm plugin version is 1.9.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP GET requests to endpoints containing 'accua_forms_download_submitted_file' from unauthenticated IPs
  • Multiple failed authentication attempts followed by file download requests

Network Indicators:

  • Spikes in outbound traffic from WordPress server after suspicious file download requests
  • Unusual patterns of requests to /wp-content/plugins/contact-forms/

SIEM Query:

source="wordpress.log" AND (uri="*accua_forms_download_submitted_file*" AND user="-")

🔗 References

📤 Share & Export