WordPress Plugin Vulnerabilities

Drag and Drop Multiple File Upload for Contact Form 7 < 1.3.3.3 - Unauthenticated File Upload Bypass

Description

Due to the plugin not properly checking the file being uploaded (via the dnd_codedropz_upload AJAX action), an attacker could bypass the checks in place and upload a PHP file.

There was a working exploit provided along with this vulnerability. It also requires the Contact Form 7 plugin to be installed on the target machine.

Proof of Concept

Affects Plugins

References

Miscellaneous

Original Researcher
Austin Martin
Verified
Yes

Timeline

Publicly Published
2020-05-26 (about 5 years ago)
Added
2020-05-26 (about 5 years ago)
Last Updated
2020-10-21 (about 5 years ago)

Other