Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14457: CWE-862 Missing Authorization in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7

0
Low
VulnerabilityCVE-2025-14457cvecve-2025-14457cwe-862
Published: Thu Jan 15 2026 (01/15/2026, 06:45:04 UTC)
Source: CVE Database V5
Vendor/Project: glenwpcoder
Product: Drag and Drop Multiple File Upload for Contact Form 7

Description

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing ownership check in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.9.2. This makes it possible for unauthenticated attackers to delete arbitrary uploaded files when the "Send attachments as links" setting is enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:18:51 UTC

Technical Analysis

CVE-2025-14457 identifies a missing authorization vulnerability (CWE-862) in the Drag and Drop Multiple File Upload for Contact Form 7 plugin developed by glenwpcoder for WordPress. The vulnerability exists in the dnd_codedropz_upload_delete() function, which lacks proper ownership verification before allowing deletion of uploaded files. This flaw affects all plugin versions up to and including 1.3.9.2. When the plugin's 'Send attachments as links' setting is enabled, unauthenticated attackers can exploit this weakness to delete arbitrary files uploaded via the plugin. The attack vector is network-based with no privileges or user interaction required, but the attack complexity is high, likely due to the need to identify valid file references or URLs. The vulnerability impacts data integrity by permitting unauthorized file deletion, but it does not compromise confidentiality or availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The CVSS v3.1 base score is 3.7, reflecting a low severity rating primarily due to limited impact and exploitation complexity.

Potential Impact

The primary impact of CVE-2025-14457 is unauthorized modification of data integrity through deletion of uploaded files. Organizations using the affected plugin with the 'Send attachments as links' feature enabled risk losing user-uploaded content, which could disrupt business processes relying on those files, such as customer communications or form submissions. Although the vulnerability does not directly affect confidentiality or availability, the loss of files could degrade service quality and user trust. The lack of authentication requirement broadens the potential attacker base, but the high attack complexity and absence of known exploits reduce immediate risk. Nonetheless, organizations with high volumes of file uploads or critical data stored via this plugin are at increased risk of operational impact and potential reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2025-14457, organizations should first verify if the 'Send attachments as links' setting is enabled in their Drag and Drop Multiple File Upload for Contact Form 7 plugin configuration. If enabled, temporarily disable this feature until a security patch is released. Monitor official plugin channels and WordPress security advisories for updates or patches addressing this vulnerability and apply them promptly once available. Implement strict access controls and file permissions on the server to limit the ability of unauthorized users to delete files outside the plugin's control. Additionally, maintain regular backups of uploaded files to enable recovery in case of deletion. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. Finally, conduct periodic security audits of WordPress plugins and configurations to identify and remediate similar authorization weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T14:55:41.035Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696891250b074b1fa58c19b1

Added to database: 1/15/2026, 7:03:01 AM

Last enriched: 2/27/2026, 11:18:51 AM

Last updated: 3/25/2026, 5:39:53 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses