VYPR
Medium severity4.9NVD Advisory· Published Oct 11, 2024· Updated Apr 15, 2026

CVE-2024-9507

CVE-2024-9507

Description

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.15.2 due to improper input validation within the iconUpload function. This makes it possible for authenticated attackers, with Administrator-level access and above, to leverage a PHP filter chain attack and read the contents of arbitrary files on the server, which can contain sensitive information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated admins can exploit improper input validation in the Bit Form plugin's iconUpload function to read arbitrary files via a PHP filter chain attack.

Root

Cause

The Contact Form by Bit Form plugin for WordPress, up to version 2.15.2, contains an arbitrary file read vulnerability in its iconUpload function. The flaw stems from improper input validation, allowing user-supplied file paths to be processed without sufficient sanitization. This enables an authenticated attacker to leverage a PHP filter chain attack to read the contents of any file on the server. [1]

Exploitation

Requirements

Exploitation requires Administrator-level access (or higher) to the WordPress instance. The attacker must be able to reach the vulnerable iconUpload endpoint, which is otherwise protected. By crafting a malicious file path through PHP wrapper techniques (the filter chain), the attacker bypasses typical upload restrictions and reads server files. No additional privileges or network position are needed beyond the admin session. [1]

Impact

Successful exploitation allows the attacker to read arbitrary files, potentially exposing sensitive data such as WordPress configuration files (including database credentials), private keys, or other application secrets. This can lead to further compromise of the site and its underlying infrastructure. The confidentiality impact is considered high, while integrity and availability are unaffected. [1]

Mitigation

The vendor has released a patched version (2.15.3) that addresses the input validation flaw. All users are strongly advised to update immediately. No workarounds are documented; the only mitigation is to apply the update. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog, but admin-level attack surface should be minimized. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.