CVE-2024-12267: CWE-73 External Control of File Name or Path in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
CVE-2024-12267 is a medium severity vulnerability in the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' by glenwpcoder. It allows unauthenticated attackers to delete limited arbitrary files on the server due to insufficient file path validation in the dnd_codedropz_upload_delete() function. The vulnerability affects all versions up to and including 1. 3. 8. 5. Although it does not permit deletion of critical files like wp-config. php that could lead to remote code execution, the ability to delete arbitrary files can disrupt website functionality or remove important data. No known exploits are currently reported in the wild. The vulnerability has a CVSS 3.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-12267 affects the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' developed by glenwpcoder. This plugin facilitates file uploads via drag and drop functionality integrated with Contact Form 7 forms. The root cause is insufficient validation of file paths in the dnd_codedropz_upload_delete() function, which handles deletion requests for uploaded files. Due to this flaw, unauthenticated attackers can craft requests that delete arbitrary files within a limited scope on the server hosting the WordPress site. The vulnerability does not allow deletion of critical configuration files such as wp-config.php, thus preventing escalation to remote code execution. The plugin versions up to and including 1.3.8.5 are affected. The CVSS 3.1 score of 5.3 indicates a medium severity, with the attack vector being network-based, no privileges required, no user interaction needed, and impact limited to integrity (file deletion). No public exploits have been reported yet, but the vulnerability poses a risk to site stability and data integrity. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious mitigation.
Potential Impact
The primary impact of this vulnerability is the unauthorized deletion of files on the affected WordPress server. While critical system files like wp-config.php are protected, attackers can still remove other files, potentially disrupting website functionality, deleting uploaded user content, or removing plugin/theme files. This can lead to degraded user experience, loss of data, and increased administrative overhead to restore deleted content. For organizations relying on Contact Form 7 with this plugin, this could result in partial denial of service or data integrity issues. Since the attack requires no authentication or user interaction, the risk of automated exploitation exists, which could affect a large number of sites if exploited at scale. However, the absence of confidentiality and availability impacts, and the limited scope of file deletion, reduce the overall severity compared to more critical vulnerabilities.
Mitigation Recommendations
Organizations should immediately verify if they use the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin and identify the version in use. Until an official patch is released, administrators can mitigate risk by disabling or removing the plugin if file upload functionality is not critical. If the plugin is essential, restrict access to the upload and deletion endpoints via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests targeting the vulnerable function. Implement strict file system permissions to limit the plugin's ability to delete files outside designated directories. Monitor web server logs for suspicious deletion requests and unusual activity related to file uploads. Regular backups of website data and uploaded files should be maintained to enable quick restoration if deletion occurs. Finally, stay alert for updates from the plugin vendor and apply patches promptly once available.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12267: CWE-73 External Control of File Name or Path in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
Description
CVE-2024-12267 is a medium severity vulnerability in the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' by glenwpcoder. It allows unauthenticated attackers to delete limited arbitrary files on the server due to insufficient file path validation in the dnd_codedropz_upload_delete() function. The vulnerability affects all versions up to and including 1. 3. 8. 5. Although it does not permit deletion of critical files like wp-config. php that could lead to remote code execution, the ability to delete arbitrary files can disrupt website functionality or remove important data. No known exploits are currently reported in the wild. The vulnerability has a CVSS 3.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-12267 affects the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' developed by glenwpcoder. This plugin facilitates file uploads via drag and drop functionality integrated with Contact Form 7 forms. The root cause is insufficient validation of file paths in the dnd_codedropz_upload_delete() function, which handles deletion requests for uploaded files. Due to this flaw, unauthenticated attackers can craft requests that delete arbitrary files within a limited scope on the server hosting the WordPress site. The vulnerability does not allow deletion of critical configuration files such as wp-config.php, thus preventing escalation to remote code execution. The plugin versions up to and including 1.3.8.5 are affected. The CVSS 3.1 score of 5.3 indicates a medium severity, with the attack vector being network-based, no privileges required, no user interaction needed, and impact limited to integrity (file deletion). No public exploits have been reported yet, but the vulnerability poses a risk to site stability and data integrity. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious mitigation.
Potential Impact
The primary impact of this vulnerability is the unauthorized deletion of files on the affected WordPress server. While critical system files like wp-config.php are protected, attackers can still remove other files, potentially disrupting website functionality, deleting uploaded user content, or removing plugin/theme files. This can lead to degraded user experience, loss of data, and increased administrative overhead to restore deleted content. For organizations relying on Contact Form 7 with this plugin, this could result in partial denial of service or data integrity issues. Since the attack requires no authentication or user interaction, the risk of automated exploitation exists, which could affect a large number of sites if exploited at scale. However, the absence of confidentiality and availability impacts, and the limited scope of file deletion, reduce the overall severity compared to more critical vulnerabilities.
Mitigation Recommendations
Organizations should immediately verify if they use the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin and identify the version in use. Until an official patch is released, administrators can mitigate risk by disabling or removing the plugin if file upload functionality is not critical. If the plugin is essential, restrict access to the upload and deletion endpoints via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests targeting the vulnerable function. Implement strict file system permissions to limit the plugin's ability to delete files outside designated directories. Monitor web server logs for suspicious deletion requests and unusual activity related to file uploads. Regular backups of website data and uploaded files should be maintained to enable quick restoration if deletion occurs. Finally, stay alert for updates from the plugin vendor and apply patches promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-05T17:24:03.437Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e33b7ef31ef0b597b0c
Added to database: 2/25/2026, 9:48:35 PM
Last enriched: 2/26/2026, 5:43:59 AM
Last updated: 2/26/2026, 8:02:55 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.