Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5972-7qfm-hj76

Опубликовано: 16 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.

EPSS

Процентиль: 66%
0.00532
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-23

Связанные уязвимости

CVSS3: 5.3
nvd
27 дней назад

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.

EPSS

Процентиль: 66%
0.00532
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-23