WordPress Plugin Vulnerabilities
JetFormBuilder < 3.5.6.3 - Unauthenticated Arbitrary File Read via Media Field
Description
The plugin is vulnerable to arbitrary file read via path traversal due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File_Tools::is_same_file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with a Media Field and a Send Email action with file attachment.
Affects Plugins
References
Classification
Type
FILE DOWNLOAD
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
daroo
Verified
No
WPVDB ID
Timeline
Publicly Published
2026-03-20 (about 1 month ago)
Added
2026-03-20 (about 1 month ago)
Last Updated
2026-03-20 (about 1 month ago)