Patch
CVE-2024-47335
with vRx
Introduction
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bit Form Bit Form – Contact Form Plugin allows SQL Injection.This issue affects Bit Form – Contact Form Plugin: from n/a through 2.13.11.
Remediation
To fix this vulnerability, the target WP instances must have the updated version of the Bit Form - Contact Form plugin.
To automate this manual process, find the attached script that would update the plugin and report the updated version and confirm that the vulnerability has been fixed (post patching).
For additional reliability, the detection script corresponding to the same CVE can be leveraged to verify the fixes have been deployed correctly.
Steps
Detecting the vulnerability:
kali@kali:~$ bash detection.sh http://127.0.0.1
[*] Started the scan...
[+] The WordPress instance seems to be vulnerable to CVE-2024-47335.
kali@kali:~$
Patching the vulnerability:
bash remediation.sh
Checking the effectiveness of the patches:
kali@kali:~$ bash detection.sh http://127.0.0.1
[*] Started the scan...
[-] The WordPress instance seems NOT to be vulnerable to CVE-2024-47335.
kali@kali:~$
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.