Impact
The vulnerability allows an authenticated user with Contributor or higher privileges to enumerate form identifiers and read the configuration of any form via the /kaliforms/v1/forms/{id} REST endpoint. The permission check only verifies that the user can edit posts and does not confirm ownership, enabling disclosure of form field structures, Google reCAPTCHA secret keys, email notification templates, and server paths. This insecure direct object reference flaw, identified as CWE‑862, permits the exposure of sensitive configuration data.
Affected Systems
WordPress sites running the Kali Forms plugin, version 2.4.8 or earlier. This includes all deployments of the “wpchill:Kali Forms — Contact Form & Drag-and-Drop Builder” plugin up to the mentioned release.
Risk and Exploitability
The CVSS base score of 4.3 indicates moderate risk; the EPSS score is below 1%, implying the exploitation probability is low at present. The likely attack vector is via the REST API, where an attacker with Contributor-level access enumerates form IDs and retrieves sensitive data. No additional prerequisites beyond appropriate WordPress role permissions are mentioned in the description.
OpenCVE Enrichment