Database for Contact Form 7, WPforms, Elementor forms Vulnerability – Authenticated (Administrator+) Arbitrary File Upload – CVE-2024-1069 | WordPress Plugin Vulnerability Report

Plugin Name: Database for Contact Form 7, WPforms, Elementor forms

Key Information:

  • Software Type: Plugin
  • Software Slug: contact-form-entries
  • Software Status: Active
  • Software Author: crmperks
  • Software Downloads: 502,953
  • Active Installs: 60,000
  • Last Updated: February 1, 2024
  • Patched Versions: 1.3.3
  • Affected Versions: <= 1.3.2

Vulnerability Details:

  • Name: Contact Form Entries <= 1.3.2
  • Title: Authenticated (Administrator+) Arbitrary File Upload
  • Type: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE: CVE-2024-1069
  • CVSS Score: 7.2
  • Publicly Published: January 30, 2024
  • Researcher: István Márton - Wordfence
  • Description: The "Database for Contact Form 7, WPforms, Elementor forms" plugin, also known as Contact Form Entries, is vulnerable to arbitrary file uploads in versions up to and including 1.3.2. The vulnerability arises from insufficient file validation in the 'view_page' function, enabling authenticated users with administrator or higher privileges to upload potentially harmful files to the server, potentially facilitating remote code execution.


The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress, harbors a significant security vulnerability in versions up to and including 1.3.2. This flaw permits authenticated administrators to upload arbitrary files, posing a severe security risk. Thankfully, this vulnerability has been addressed in the recent 1.3.3 update.

Detailed Overview:

Discovered by István Márton from Wordfence, this vulnerability highlights a critical risk in the plugin's 'view_page' function, which failed to adequately validate uploaded files. Such a loophole could allow attackers with administrative access to deploy malicious scripts or other harmful files onto the website's server, potentially leading to unauthorized access, data breaches, or further exploitation of the server resources. The severity of this vulnerability, reflected in its 7.2 CVSS score, underscores the importance of robust file validation mechanisms in web applications, especially those with file upload capabilities.

Advice for Users:

  • Immediate Action: It is imperative for users of the Database for Contact Form 7, WPforms, Elementor forms plugin to immediately update to the patched version, 1.3.3, to mitigate the risk associated with this vulnerability.
  • Check for Signs of Vulnerability: Administrators should review their site's files and logs for any unusual or unauthorized uploads or changes, especially if running a version prior to 1.3.3.
  • Alternate Plugins: Considering the severity of this vulnerability, users may evaluate alternative form management plugins with a strong security track record as a precautionary measure.
  • Stay Updated: This incident serves as a reminder of the critical importance of regular updates. Ensuring all WordPress components are up-to-date is a cornerstone of maintaining a secure web presence.


The swift identification and patching of this vulnerability by the plugin's developers and the security community at large highlight the dynamic nature of web security and the critical role of community vigilance. For WordPress site owners, especially small businesses with limited IT resources, this incident underscores the necessity of regular maintenance and the value of security best practices in safeguarding digital assets against evolving threats.


In today's digital age, the security of a website can never be taken for granted, especially for small businesses that rely heavily on their online presence. The recent identification of a critical vulnerability within the "Database for Contact Form 7, WPforms, Elementor forms" plugin, known as CVE-2024-1069, serves as a stark reminder of the continuous battle against cyber threats. This plugin, integral to over 60,000 WordPress sites for managing form entries, was found to harbor a flaw that could potentially compromise the entire website.

Plugin Overview:

The "Database for Contact Form 7, WPforms, Elementor forms" plugin, developed by crmperks, is a popular WordPress extension used to store form submissions from visitors. With over half a million downloads, this tool is crucial for website administrators to capture and manage user data efficiently. However, the convenience it offers was shadowed by a severe security lapse in versions up to and including 1.3.2.

The Vulnerability Explained:

CVE-2024-1069, an Authenticated (Administrator+) Arbitrary File Upload vulnerability, was discovered by István Márton from the Wordfence security team. This vulnerability allowed users with administrative privileges to upload files of any type to the server without proper validation, paving the way for potential remote code execution. Such a loophole could lead to unauthorized access, data breaches, and a host of other security nightmares.

Potential Risks and Impacts:

The implications of this vulnerability cannot be overstated. An exploited website could serve as a launchpad for further attacks, not only jeopardizing the site's integrity but also the sensitive data it holds. For small businesses, the fallout could extend beyond the digital realm, affecting reputation, customer trust, and ultimately, the bottom line.

Remediation Steps:

In response to this discovery, a patched version of the plugin, 1.3.3, was swiftly released. It is imperative for website owners to update their plugin to this latest version to close off this vulnerability. Additionally, reviewing site logs for unusual activity and considering alternative, well-vetted plugins can further bolster security.

Historical Context:

This is not the plugin's first encounter with security issues; it has seen 7 vulnerabilities since January 5, 2021. This history emphasizes the need for continuous vigilance and regular updates, as each patch not only addresses known flaws but also strengthens the plugin's overall security posture.

The Importance of Proactive Security:

For small business owners juggling countless priorities, staying ahead of security vulnerabilities may seem daunting. Yet, the digital health of your business depends on this proactive approach. Leveraging automated update features, subscribing to security blogs or services, and occasionally consulting with cybersecurity professionals can help maintain a robust defense without overwhelming your schedule.

In conclusion, the discovery of CVE-2024-1069 within a widely used WordPress plugin is a critical wake-up call for small business owners. It underscores the necessity of maintaining up-to-date software and adopting a proactive stance on cybersecurity. In the digital arena, where threats constantly evolve, staying informed and prepared is your best defense against the unforeseen challenges of tomorrow.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Database for Contact Form 7, WPforms, Elementor forms Vulnerability – Authenticated (Administrator+) Arbitrary File Upload – CVE-2024-1069 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment