CVE-2025-14457: CWE-862 Missing Authorization in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing ownership check in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.9.2. This makes it possible for unauthenticated attackers to delete arbitrary uploaded files when the "Send attachments as links" setting is enabled.
AI Analysis
Technical Summary
CVE-2025-14457 identifies a missing authorization vulnerability (CWE-862) in the Drag and Drop Multiple File Upload for Contact Form 7 plugin developed by glenwpcoder for WordPress. The vulnerability exists in the dnd_codedropz_upload_delete() function, which lacks proper ownership verification before allowing deletion of uploaded files. This flaw affects all plugin versions up to and including 1.3.9.2. When the plugin's 'Send attachments as links' setting is enabled, unauthenticated attackers can exploit this weakness to delete arbitrary files uploaded via the plugin. The attack vector is network-based with no privileges or user interaction required, but the attack complexity is high, likely due to the need to identify valid file references or URLs. The vulnerability impacts data integrity by permitting unauthorized file deletion, but it does not compromise confidentiality or availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The CVSS v3.1 base score is 3.7, reflecting a low severity rating primarily due to limited impact and exploitation complexity.
Potential Impact
The primary impact of CVE-2025-14457 is unauthorized modification of data integrity through deletion of uploaded files. Organizations using the affected plugin with the 'Send attachments as links' feature enabled risk losing user-uploaded content, which could disrupt business processes relying on those files, such as customer communications or form submissions. Although the vulnerability does not directly affect confidentiality or availability, the loss of files could degrade service quality and user trust. The lack of authentication requirement broadens the potential attacker base, but the high attack complexity and absence of known exploits reduce immediate risk. Nonetheless, organizations with high volumes of file uploads or critical data stored via this plugin are at increased risk of operational impact and potential reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2025-14457, organizations should first verify if the 'Send attachments as links' setting is enabled in their Drag and Drop Multiple File Upload for Contact Form 7 plugin configuration. If enabled, temporarily disable this feature until a security patch is released. Monitor official plugin channels and WordPress security advisories for updates or patches addressing this vulnerability and apply them promptly once available. Implement strict access controls and file permissions on the server to limit the ability of unauthorized users to delete files outside the plugin's control. Additionally, maintain regular backups of uploaded files to enable recovery in case of deletion. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. Finally, conduct periodic security audits of WordPress plugins and configurations to identify and remediate similar authorization weaknesses proactively.
Affected Countries
United States, United Kingdom, Germany, Australia, Canada, India, France, Netherlands, Brazil, Japan
CVE-2025-14457: CWE-862 Missing Authorization in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
Description
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing ownership check in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.9.2. This makes it possible for unauthenticated attackers to delete arbitrary uploaded files when the "Send attachments as links" setting is enabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14457 identifies a missing authorization vulnerability (CWE-862) in the Drag and Drop Multiple File Upload for Contact Form 7 plugin developed by glenwpcoder for WordPress. The vulnerability exists in the dnd_codedropz_upload_delete() function, which lacks proper ownership verification before allowing deletion of uploaded files. This flaw affects all plugin versions up to and including 1.3.9.2. When the plugin's 'Send attachments as links' setting is enabled, unauthenticated attackers can exploit this weakness to delete arbitrary files uploaded via the plugin. The attack vector is network-based with no privileges or user interaction required, but the attack complexity is high, likely due to the need to identify valid file references or URLs. The vulnerability impacts data integrity by permitting unauthorized file deletion, but it does not compromise confidentiality or availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The CVSS v3.1 base score is 3.7, reflecting a low severity rating primarily due to limited impact and exploitation complexity.
Potential Impact
The primary impact of CVE-2025-14457 is unauthorized modification of data integrity through deletion of uploaded files. Organizations using the affected plugin with the 'Send attachments as links' feature enabled risk losing user-uploaded content, which could disrupt business processes relying on those files, such as customer communications or form submissions. Although the vulnerability does not directly affect confidentiality or availability, the loss of files could degrade service quality and user trust. The lack of authentication requirement broadens the potential attacker base, but the high attack complexity and absence of known exploits reduce immediate risk. Nonetheless, organizations with high volumes of file uploads or critical data stored via this plugin are at increased risk of operational impact and potential reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2025-14457, organizations should first verify if the 'Send attachments as links' setting is enabled in their Drag and Drop Multiple File Upload for Contact Form 7 plugin configuration. If enabled, temporarily disable this feature until a security patch is released. Monitor official plugin channels and WordPress security advisories for updates or patches addressing this vulnerability and apply them promptly once available. Implement strict access controls and file permissions on the server to limit the ability of unauthorized users to delete files outside the plugin's control. Additionally, maintain regular backups of uploaded files to enable recovery in case of deletion. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. Finally, conduct periodic security audits of WordPress plugins and configurations to identify and remediate similar authorization weaknesses proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T14:55:41.035Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696891250b074b1fa58c19b1
Added to database: 1/15/2026, 7:03:01 AM
Last enriched: 2/27/2026, 11:18:51 AM
Last updated: 3/25/2026, 5:39:53 PM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.