Cyber Posture

CVE-2024-12544

High

Published: 01 March 2025

Published
01 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0171 82.4th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

The SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity plugin for WordPress is vulnerable to arbitrary file deletion due to a missing capability check on the callback function of the SurveyJS_DeleteFile class in all versions up to, and including, 1.12.17. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This function is still vulnerable to Cross-Site Request Forgery as of 1.12.20.

Security Summary

CVE-2024-12544 affects the SurveyJS: Drag & Drop WordPress Form Builder plugin for WordPress in all versions up to and including 1.12.17. The vulnerability enables arbitrary file deletion due to a missing capability check in the callback function of the SurveyJS_DeleteFile class, corresponding to CWE-862 (Missing Authorization). It carries a CVSS 3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Authenticated attackers with Subscriber-level access or higher can exploit this issue to delete arbitrary files on the server. Targeting critical files such as wp-config.php can readily result in remote code execution.

Patches are available via WordPress plugin trac changesets 3214665 and 3222216/surveyjs/trunk/ajax_handlers/delete_file.php, with additional details in Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/e9404fe4-855e-4eb4-81c4-5246f6e9be0c?source=cve. However, the function remains vulnerable to Cross-Site Request Forgery as of version 1.12.20.

Details

CWE(s)
CWE-862

References