CVE-2024-7447

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress sites using the Funnelforms Free plugin. Any WordPress site running vulnerable versions of this plugin is affected, regardless of whether forms are configured.

💻 Affected Systems

Products:
  • Funnelforms Free - Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor for WordPress
Versions: All versions up to and including 3.7.3.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable even if no forms are created or published. Affects all WordPress installations with the plugin active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could upload malicious PHP files and achieve remote code execution, potentially taking full control of the WordPress site and underlying server.

🟠

Likely Case

Attackers upload malicious files (webshells, malware) to compromise the site, deface content, or use the site for phishing campaigns.

🟢

If Mitigated

With proper file type restrictions and web application firewalls, impact is limited to storage consumption and potential denial of service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to vulnerable endpoint. Public exploit code available in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7.3.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3141470/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find Funnelforms Free. 4. Click 'Update Now' if available. 5. If no update shows, manually download version 3.7.3.3+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate funnelforms-free

Web Application Firewall rule

all

Block requests to the vulnerable endpoint

Block POST requests to /wp-content/plugins/funnelforms-free/frontend/frontend.php with parameter 'action=fnsf_af2_handel_file_upload'

🧯 If You Can't Patch

  • Implement strict file upload restrictions at web server level
  • Monitor upload directories for suspicious files and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Funnelforms Free version. If version ≤ 3.7.3.2, vulnerable.

Check Version:

wp plugin get funnelforms-free --field=version

Verify Fix Applied:

Confirm plugin version is 3.7.3.3 or higher. Test file upload functionality from unauthenticated context should fail.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-content/plugins/funnelforms-free/frontend/frontend.php with action=fnsf_af2_handel_file_upload from unauthenticated users
  • Unexpected file uploads to wp-content/uploads/funnelforms/ directory

Network Indicators:

  • Unusual file upload traffic to WordPress site from unknown IPs
  • POST requests with file uploads to plugin endpoint without authentication

SIEM Query:

source="web_access_logs" AND uri_path="/wp-content/plugins/funnelforms-free/frontend/frontend.php" AND http_method="POST" AND NOT user_agent="WordPress/*"

🔗 References

📤 Share & Export