Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total12
Critical2
High4
Medium5
Reset
Showing 1-12 of 12 records
Threat Entry Updated 2026-01-08

CVE-2025-14901 - Bit Form Plugin

The Bit Form – Contact Form Plugin plugin for WordPress is vulnerable to unauthorized workflow execution due to missing authorization in the triggerWorkFlow function in all versions up to, and including, 2.21.6. This is due to a logic flaw in the nonce verification where the security check only blocks requests when both the nonce verification fails and the user is logged in. This makes it possible for unauthenticated attackers to replay form workflow executions and trigger all configured integrations including webhooks, email notifications, CRM integrations, and automation platforms via the…

PLUGIN Bit Form

CVE-2025-14901

MEDIUM CVSS 6.5 2026-01-07
Threat Entry Updated 2025-08-15

CVE-2025-6679 - Bit Form Plugin

The Bit Form builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 2.20.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. For this to be exploitable, the PRO version needs to be installed and activated as well. Additionally a form with an advanced file upload element needs to be published.

PLUGIN Bit Form

CVE-2025-6679

CRITICAL CVSS 9.8 2025-08-15
Threat Entry Updated 2025-07-10

CVE-2024-13451 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.17.4 via file uploads due to insufficient directory listing prevention and lack of randomization of file names. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via a form. The vulnerability was partially patched in version 2.17.5.

PLUGIN Bit Form

CVE-2024-13451

MEDIUM CVSS 5.3 2025-07-02
Threat Entry Updated 2025-04-29

CVE-2025-2580 - Bit Form Plugin

The Contact Form by Bit Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.18.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Bit Form

CVE-2025-2580

MEDIUM CVSS 4.9 2025-04-25
Threat Entry Updated 2025-02-04

CVE-2024-13450 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.17.4 via the Webhooks integration. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. The vulnerability can also be exploited in Multisite environments.

PLUGIN Bit Form

CVE-2024-13450

LOW CVSS 3.8 2025-01-25
Threat Entry Updated 2024-10-15

CVE-2024-9507 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.15.2 due to improper input validation within the iconUpload function. This makes it possible for authenticated attackers, with Administrator-level access and above, to leverage a PHP filter chain attack and read the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN Bit Form

CVE-2024-9507

MEDIUM CVSS 4.9 2024-10-11
Threat Entry Updated 2024-08-26

CVE-2024-7782 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the iconRemove function in versions 2.0 to 2.13.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Bit Form

CVE-2024-7782

HIGH CVSS 8.7 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7777 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in multiple functions in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to read and delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Bit Form

CVE-2024-7777

CRITICAL CVSS 9.0 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7780 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Bit Form

CVE-2024-7780

HIGH CVSS 7.2 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7775 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary JavaScript file uploads due to missing input validation in the addCustomCode function in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary JavaScript files to the affected site's server.

PLUGIN Bit Form

CVE-2024-7775

MEDIUM CVSS 5.5 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7702 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the entryID parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database.

PLUGIN Bit Form

CVE-2024-7702

HIGH CVSS 7.2 2024-08-20
Threat Entry Updated 2024-11-21

CVE-2024-6123 - Bit Form Plugin

The Bit Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'iconUpload' function in all versions up to, and including, 2.13.3. This makes it possible for authenticated attackers, with administrator-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Bit Form

CVE-2024-6123

HIGH CVSS 7.2 2024-07-09
Scroll to top