{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T04:06:32.298","vulnerabilities":[{"cve":{"id":"CVE-2024-9417","sourceIdentifier":"security@wordfence.com","published":"2024-10-05T10:15:02.957","lastModified":"2025-02-27T19:58:41.700","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to limited file uploads due to a misconfigured file type validation in the 'handleUpload' function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to upload files that are excluded from both the 'allowedExtensions' and 'unallowed_extensions' arrays on the affected site's server, including files that may contain cross-site scripting."},{"lang":"es","value":"El complemento Hash Form – Drag &amp; Drop Form Builder para WordPress es vulnerable a la carga limitada de archivos debido a una validación de tipo de archivo mal configurada en la función 'handleUpload' en todas las versiones hasta la 1.1.9 incluida. Esto hace posible que atacantes no autenticados carguen archivos que están excluidos de las matrices 'allowedExtensions' y 'unallowed_extensions' en el servidor del sitio afectado, incluidos archivos que pueden contener cross-site scripting."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hashthemes:hash_form:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.2.0","matchCriteriaId":"5279A5E2-D8E3-434E-831F-995426909E9C"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/hash-form/trunk/admin/classes/HashFormUploader.php#L107","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/browser/hash-form/trunk/admin/classes/HashFormUploader.php#L135","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3161828/","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/cad7731a-1f81-4055-9b49-15b35edd3fcf?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}