
Cloud Vulnerability DB
A community-led vulnerabilities database
The Message Filter for Contact Form 7 WordPress plugin (versions up to 1.6.3) contains a vulnerability identified as CVE-2024-12027. The vulnerability stems from missing capability checks in the updateFilter() and deleteFilter() functions, which allows authenticated attackers with subscriber-level access or higher to modify and delete filters without proper authorization (NVD).
The vulnerability is classified as a Missing Authorization issue (CWE-862) with a CVSS v3.1 Base Score of 4.3 (MEDIUM). The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U) with no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N) (Wordfence).
The vulnerability allows authenticated attackers with subscriber-level access or higher to manipulate the plugin's filter functionality by updating and deleting filters. This could potentially compromise the effectiveness of the spam filtering system, as attackers could modify or remove filters designed to protect against unwanted messages (NVD).
Website administrators should update the Message Filter for Contact Form 7 plugin to a version newer than 1.6.3 when available. In the meantime, it is recommended to review and possibly restrict user roles and permissions to minimize the potential attack surface (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."