
Cloud Vulnerability DB
A community-led vulnerabilities database
The Contact Form Plugin by Fluent Forms for WordPress (CVE-2024-2771) contains a critical privilege escalation vulnerability affecting versions up to 5.1.16. The vulnerability stems from a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint, discovered and disclosed on May 18, 2024 (NVD, SecurityOnline).
The vulnerability is rated as Critical with a CVSS v3.1 score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The security flaw is classified under CWE-862 (Missing Authorization) and affects the REST API endpoint that manages plugin permissions. The vulnerability allows unauthenticated attackers to manipulate user permissions and access plugin settings without proper authorization (NVD).
The vulnerability affects over 400,000 active WordPress installations using the Fluent Forms plugin. Successful exploitation allows unauthenticated attackers to grant themselves or others administrative access to the plugin's settings and features, as well as delete manager accounts. This can lead to complete plugin compromise and potential website takeover (SecurityOnline).
The vulnerability has been patched in version 5.1.17 of the Fluent Forms plugin. Website administrators are strongly urged to update to this version immediately. The fix implements proper authorization checks in the RoleManagerPolicy.php file (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."