Home

Description

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.

PUBLISHED Reserved 2025-08-01 | Published 2025-08-16 | Updated 2025-08-18 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-23 Relative Path Traversal

Product status

Default status
unaffected

*
affected

Timeline

2025-07-09:Discovered
2025-08-01:Vendor Notified
2025-08-15:Disclosed

Credits

Thien Tran finder

References

www.wordfence.com/...-f675-4c9f-a7b3-525a3c3c5775?source=cve

plugins.trac.wordpress.org/...1.3.9.0/inc/dnd-upload-cf7.php

plugins.trac.wordpress.org/...1.3.9.0/inc/dnd-upload-cf7.php

plugins.trac.wordpress.org/...1.3.9.0/inc/dnd-upload-cf7.php

plugins.trac.wordpress.org/...t-form-7&sfp_email=&sfph_mail=

cve.org (CVE-2025-8464)

nvd.nist.gov (CVE-2025-8464)

Download JSON