CVE-2024-7782

8.7 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with Administrator-level WordPress access to delete arbitrary files on the server due to insufficient path validation in the Bit Form plugin. Successful exploitation can lead to remote code execution by deleting critical files like wp-config.php. WordPress sites using vulnerable versions of the Bit Form plugin are affected.

💻 Affected Systems

Products:
  • Bit Form WordPress Plugin
Versions: 2.0 to 2.13.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have Administrator-level WordPress access; vulnerable in default plugin configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise via remote code execution leading to data theft, defacement, or ransomware deployment.

🟠

Likely Case

Site disruption or data loss from deletion of critical WordPress files, potentially requiring full restoration from backups.

🟢

If Mitigated

Limited impact if proper access controls and file permissions prevent unauthorized administrator account creation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.13.5 and later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/bit-form/tags/2.13.5

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Bit Form' and click 'Update Now'. 4. Verify version is 2.13.5 or higher.

🔧 Temporary Workarounds

Disable Bit Form Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate bit-form

Restrict Administrator Access

all

Implement strict access controls and monitoring for WordPress administrator accounts.

🧯 If You Can't Patch

  • Remove administrator access from all non-essential users and implement multi-factor authentication.
  • Implement file integrity monitoring to detect unauthorized file deletions.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Bit Form → Version. If version is between 2.0 and 2.13.4 inclusive, the system is vulnerable.

Check Version:

wp plugin get bit-form --field=version

Verify Fix Applied:

Confirm Bit Form plugin version is 2.13.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in web server logs
  • Administrator account login from unexpected IP addresses
  • POST requests to /wp-admin/admin-ajax.php with 'action=bitforms_icon_remove' parameter

Network Indicators:

  • Unusual administrator-level API calls to WordPress admin endpoints

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "bitforms_icon_remove")

🔗 References

📤 Share & Export