CVE-2024-12544
Published: 01 March 2025
Description
The SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity plugin for WordPress is vulnerable to arbitrary file deletion due to a missing capability check on the callback function of the SurveyJS_DeleteFile class in all versions up to, and including, 1.12.17. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This function is still vulnerable to Cross-Site Request Forgery as of 1.12.20.
Security Summary
CVE-2024-12544 affects the SurveyJS: Drag & Drop WordPress Form Builder plugin for WordPress in all versions up to and including 1.12.17. The vulnerability enables arbitrary file deletion due to a missing capability check in the callback function of the SurveyJS_DeleteFile class, corresponding to CWE-862 (Missing Authorization). It carries a CVSS 3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Authenticated attackers with Subscriber-level access or higher can exploit this issue to delete arbitrary files on the server. Targeting critical files such as wp-config.php can readily result in remote code execution.
Patches are available via WordPress plugin trac changesets 3214665 and 3222216/surveyjs/trunk/ajax_handlers/delete_file.php, with additional details in Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/e9404fe4-855e-4eb4-81c4-5246f6e9be0c?source=cve. However, the function remains vulnerable to Cross-Site Request Forgery as of version 1.12.20.
Details
- CWE(s)