The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.17.4 via file uploads due to insufficient directory listing prevention and lack of randomization of file names. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via a form. The vulnerability was partially patched in version 2.17.5.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Jul 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.17.4 via file uploads due to insufficient directory listing prevention and lack of randomization of file names. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via a form. The vulnerability was partially patched in version 2.17.5. | |
Title | Contact Form by Bit Form <= 2.17.5 - Unauthenticated Sensitive Information Exposure | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-02T05:29:18.066Z
Updated: 2025-07-02T13:10:40.775Z
Reserved: 2025-01-16T01:36:05.668Z
Link: CVE-2024-13451

Updated: 2025-07-02T13:10:35.848Z

Status : Awaiting Analysis
Published: 2025-07-02T06:15:22.630
Modified: 2025-07-03T15:13:53.147
Link: CVE-2024-13451

No data.