Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12267: CWE-73 External Control of File Name or Path in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7

0
Medium
VulnerabilityCVE-2024-12267cvecve-2024-12267cwe-73
Published: Fri Jan 31 2025 (01/31/2025, 11:11:09 UTC)
Source: CVE Database V5
Vendor/Project: glenwpcoder
Product: Drag and Drop Multiple File Upload for Contact Form 7

Description

CVE-2024-12267 is a medium severity vulnerability in the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' by glenwpcoder. It allows unauthenticated attackers to delete limited arbitrary files on the server due to insufficient file path validation in the dnd_codedropz_upload_delete() function. The vulnerability affects all versions up to and including 1. 3. 8. 5. Although it does not permit deletion of critical files like wp-config. php that could lead to remote code execution, the ability to delete arbitrary files can disrupt website functionality or remove important data. No known exploits are currently reported in the wild. The vulnerability has a CVSS 3.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:43:59 UTC

Technical Analysis

The vulnerability identified as CVE-2024-12267 affects the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' developed by glenwpcoder. This plugin facilitates file uploads via drag and drop functionality integrated with Contact Form 7 forms. The root cause is insufficient validation of file paths in the dnd_codedropz_upload_delete() function, which handles deletion requests for uploaded files. Due to this flaw, unauthenticated attackers can craft requests that delete arbitrary files within a limited scope on the server hosting the WordPress site. The vulnerability does not allow deletion of critical configuration files such as wp-config.php, thus preventing escalation to remote code execution. The plugin versions up to and including 1.3.8.5 are affected. The CVSS 3.1 score of 5.3 indicates a medium severity, with the attack vector being network-based, no privileges required, no user interaction needed, and impact limited to integrity (file deletion). No public exploits have been reported yet, but the vulnerability poses a risk to site stability and data integrity. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious mitigation.

Potential Impact

The primary impact of this vulnerability is the unauthorized deletion of files on the affected WordPress server. While critical system files like wp-config.php are protected, attackers can still remove other files, potentially disrupting website functionality, deleting uploaded user content, or removing plugin/theme files. This can lead to degraded user experience, loss of data, and increased administrative overhead to restore deleted content. For organizations relying on Contact Form 7 with this plugin, this could result in partial denial of service or data integrity issues. Since the attack requires no authentication or user interaction, the risk of automated exploitation exists, which could affect a large number of sites if exploited at scale. However, the absence of confidentiality and availability impacts, and the limited scope of file deletion, reduce the overall severity compared to more critical vulnerabilities.

Mitigation Recommendations

Organizations should immediately verify if they use the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin and identify the version in use. Until an official patch is released, administrators can mitigate risk by disabling or removing the plugin if file upload functionality is not critical. If the plugin is essential, restrict access to the upload and deletion endpoints via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests targeting the vulnerable function. Implement strict file system permissions to limit the plugin's ability to delete files outside designated directories. Monitor web server logs for suspicious deletion requests and unusual activity related to file uploads. Regular backups of website data and uploaded files should be maintained to enable quick restoration if deletion occurs. Finally, stay alert for updates from the plugin vendor and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-05T17:24:03.437Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e33b7ef31ef0b597b0c

Added to database: 2/25/2026, 9:48:35 PM

Last enriched: 2/26/2026, 5:43:59 AM

Last updated: 2/26/2026, 8:02:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats