CVE-2024-12201

4.3 MEDIUM

📋 TL;DR

The Hash Form WordPress plugin has an authorization vulnerability that allows authenticated users with Contributor-level permissions or higher to create new form styles without proper authorization. This affects all WordPress sites using Hash Form plugin versions up to 1.2.1. The vulnerability stems from missing capability checks in the form style creation functionality.

💻 Affected Systems

Products:
  • Hash Form – Drag & Drop Form Builder WordPress plugin
Versions: All versions up to and including 1.2.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Hash Form plugin and at least one user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious contributor could create disruptive form styles, potentially defacing forms or creating phishing forms to harvest user data.

🟠

Likely Case

Contributor-level users could create unauthorized form styles, potentially disrupting form functionality or creating unwanted form variations.

🟢

If Mitigated

With proper user role management and plugin updates, impact is limited to minor administrative issues.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3205245%40hash-form&new=3205245%40hash-form&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Hash Form – Drag & Drop Form Builder'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.2.2+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary User Role Restriction

all

Temporarily restrict Contributor role permissions or remove unnecessary Contributor users until patch is applied.

Plugin Deactivation

all

Temporarily deactivate Hash Form plugin if not critical to site functionality.

🧯 If You Can't Patch

  • Implement strict user role management and audit Contributor-level users
  • Monitor form style changes and implement approval workflows for form modifications

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Hash Form version. If version is 1.2.1 or lower, system is vulnerable.

Check Version:

wp plugin list --name=hash-form --field=version (if WP-CLI installed)

Verify Fix Applied:

After update, verify Hash Form plugin version is 1.2.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form style creation events by Contributor users
  • Multiple form style creation attempts from single user

Network Indicators:

  • POST requests to form style creation endpoints from non-admin users

SIEM Query:

source="wordpress" AND (event="form_style_created" OR plugin_action="hash_form") AND user_role="contributor"

🔗 References

📤 Share & Export