WordPress Plugin Vulnerabilities
Drag and Drop Multiple File Upload for Contact Form 7 < 1.3.3.3 - Unauthenticated File Upload Bypass
Description
Due to the plugin not properly checking the file being uploaded (via the dnd_codedropz_upload AJAX action), an attacker could bypass the checks in place and upload a PHP file.
There was a working exploit provided along with this vulnerability. It also requires the Contact Form 7 plugin to be installed on the target machine.
Proof of Concept
Affects Plugins
References
Miscellaneous
Original Researcher
Austin Martin
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2020-05-26 (about 5 years ago)
Added
2020-05-26 (about 5 years ago)
Last Updated
2020-10-21 (about 5 years ago)