CVE-2024-6311
📋 TL;DR
The Funnelforms Free WordPress plugin allows authenticated administrators to upload arbitrary files due to missing file type validation. This vulnerability can lead to remote code execution on affected WordPress sites. Only WordPress installations with the vulnerable plugin versions are affected.
💻 Affected Systems
- Funnelforms Free WordPress Plugin
📦 What is this software?
Funnelforms Free by Funnelforms
⚠️ Risk & Real-World Impact
Worst Case
Attackers with administrator access upload malicious PHP files and achieve full server compromise, potentially leading to data theft, site defacement, or ransomware deployment.
Likely Case
Attackers upload web shells or backdoors to maintain persistent access, steal sensitive data, or use the server for further attacks.
If Mitigated
With proper file upload restrictions and web application firewalls, exploitation attempts are blocked or detected before successful compromise.
🎯 Exploit Status
Exploitation requires administrator credentials but is technically simple once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.7.4.1
Vendor Advisory: https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.4.1/admin/menu_ajax_functions/formularbuilder_fonts.php?rev=3141470#L50
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Funnelforms Free and click 'Update Now'. 4. Verify version is 3.7.4.1 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the vulnerable plugin until patching is possible.
wp plugin deactivate funnelforms-free
Restrict File Uploads
linuxConfigure web server to block execution of uploaded files in WordPress upload directories.
# Add to .htaccess in wp-content/uploads:
<Files *.php>
Order Deny,Allow
Deny from all
</Files>
🧯 If You Can't Patch
- Remove administrator access from untrusted users and implement strong password policies
- Implement web application firewall rules to block suspicious file uploads
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for Funnelforms Free version ≤3.7.3.2
Check Version:
wp plugin get funnelforms-free --field=version
Verify Fix Applied:
Confirm plugin version is ≥3.7.4.1 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/uploads/funnelforms/
- POST requests to admin-ajax.php with action=af2_add_font
Network Indicators:
- Unexpected outbound connections from WordPress server
- File uploads containing executable code
SIEM Query:
source="wordpress.log" AND (uri="/wp-admin/admin-ajax.php" AND parameters.action="af2_add_font")
🔗 References
- https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.3.2/admin/menu_ajax_functions/formularbuilder_fonts.php#L47
- https://plugins.trac.wordpress.org/browser/funnelforms-free/tags/3.7.4.1/admin/menu_ajax_functions/formularbuilder_fonts.php?rev=3141470#L50
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cbd42fc4-ab4a-4053-b765-18272eacd2bc?source=cve