CVE-2025-14842: CWE-434 Unrestricted Upload of File with Dangerous Type in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
The Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress is vulnerable to limited upload of files with a dangerous type in all versions up to, and including, 1.3.9.2. This is due to the plugin not blocking .phar and .svg files. This makes it possible for unauthenticated attackers to upload arbitrary .phar or .svg files containing malicious PHP or JavaScript code. Malicious PHP code can be used to achieve remote code execution on the server via direct file access, if the server is configured to execute .phar files as PHP. The upload of .svg files allows for Stored Cross-Site Scripting under certain circumstances.
AI Analysis
Technical Summary
CVE-2025-14842 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the 'Drag and Drop Multiple File Upload for Contact Form 7' WordPress plugin by glenwpcoder. This plugin, widely used to enhance file upload capabilities in Contact Form 7, fails to properly restrict uploads of certain file types, specifically .phar and .svg files. The vulnerability affects all versions up to and including 1.3.9.2. Attackers can exploit this by uploading malicious .phar files containing PHP code or .svg files containing JavaScript payloads. If the server is configured to execute .phar files as PHP scripts, this can lead to remote code execution (RCE), allowing attackers to run arbitrary commands on the server, potentially compromising the entire web application and underlying system. The .svg files can be used to perform stored cross-site scripting (XSS) attacks, which can steal user credentials, hijack sessions, or perform actions on behalf of authenticated users. The attack vector is network-based and does not require authentication, but user interaction is needed to trigger the XSS. The vulnerability has a CVSS v3.1 base score of 6.1, indicating medium severity. No known exploits are reported in the wild yet, but the risk remains significant due to the ease of file upload and potential impact. The vulnerability highlights the importance of strict file type validation and secure server configurations in WordPress environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those running WordPress sites with the affected plugin installed. The ability for unauthenticated attackers to upload malicious files can lead to remote code execution, which may result in full server compromise, data breaches, defacement, or use of the server as a pivot point for further attacks. Stored XSS via .svg files can compromise user accounts, leak sensitive information, and damage organizational reputation. Public-facing websites, e-commerce platforms, and government portals are particularly at risk. The impact extends to confidentiality, integrity, and availability of affected systems. Given the widespread use of WordPress in Europe, especially in small and medium enterprises and public sector websites, the vulnerability could be exploited to disrupt services or steal sensitive data. Moreover, GDPR implications arise if personal data is compromised, potentially leading to regulatory penalties.
Mitigation Recommendations
1. Immediately monitor for plugin updates and apply patches from the vendor once available. 2. Temporarily disable or remove the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin if patching is not feasible. 3. Implement strict server-side file type validation to block uploads of .phar, .svg, and other potentially dangerous file types. 4. Configure the web server to never execute .phar files as PHP scripts, for example by disabling PHP execution in upload directories or using appropriate server directives. 5. Employ Web Application Firewalls (WAF) with rules to detect and block malicious file uploads and suspicious payloads. 6. Conduct regular security audits of WordPress plugins and themes to identify and mitigate similar risks. 7. Educate site administrators on the risks of unrestricted file uploads and the importance of plugin hygiene. 8. Use Content Security Policy (CSP) headers to mitigate the impact of XSS attacks. 9. Monitor logs for unusual file upload activity and access patterns indicative of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-14842: CWE-434 Unrestricted Upload of File with Dangerous Type in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
Description
The Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress is vulnerable to limited upload of files with a dangerous type in all versions up to, and including, 1.3.9.2. This is due to the plugin not blocking .phar and .svg files. This makes it possible for unauthenticated attackers to upload arbitrary .phar or .svg files containing malicious PHP or JavaScript code. Malicious PHP code can be used to achieve remote code execution on the server via direct file access, if the server is configured to execute .phar files as PHP. The upload of .svg files allows for Stored Cross-Site Scripting under certain circumstances.
AI-Powered Analysis
Technical Analysis
CVE-2025-14842 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the 'Drag and Drop Multiple File Upload for Contact Form 7' WordPress plugin by glenwpcoder. This plugin, widely used to enhance file upload capabilities in Contact Form 7, fails to properly restrict uploads of certain file types, specifically .phar and .svg files. The vulnerability affects all versions up to and including 1.3.9.2. Attackers can exploit this by uploading malicious .phar files containing PHP code or .svg files containing JavaScript payloads. If the server is configured to execute .phar files as PHP scripts, this can lead to remote code execution (RCE), allowing attackers to run arbitrary commands on the server, potentially compromising the entire web application and underlying system. The .svg files can be used to perform stored cross-site scripting (XSS) attacks, which can steal user credentials, hijack sessions, or perform actions on behalf of authenticated users. The attack vector is network-based and does not require authentication, but user interaction is needed to trigger the XSS. The vulnerability has a CVSS v3.1 base score of 6.1, indicating medium severity. No known exploits are reported in the wild yet, but the risk remains significant due to the ease of file upload and potential impact. The vulnerability highlights the importance of strict file type validation and secure server configurations in WordPress environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those running WordPress sites with the affected plugin installed. The ability for unauthenticated attackers to upload malicious files can lead to remote code execution, which may result in full server compromise, data breaches, defacement, or use of the server as a pivot point for further attacks. Stored XSS via .svg files can compromise user accounts, leak sensitive information, and damage organizational reputation. Public-facing websites, e-commerce platforms, and government portals are particularly at risk. The impact extends to confidentiality, integrity, and availability of affected systems. Given the widespread use of WordPress in Europe, especially in small and medium enterprises and public sector websites, the vulnerability could be exploited to disrupt services or steal sensitive data. Moreover, GDPR implications arise if personal data is compromised, potentially leading to regulatory penalties.
Mitigation Recommendations
1. Immediately monitor for plugin updates and apply patches from the vendor once available. 2. Temporarily disable or remove the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin if patching is not feasible. 3. Implement strict server-side file type validation to block uploads of .phar, .svg, and other potentially dangerous file types. 4. Configure the web server to never execute .phar files as PHP scripts, for example by disabling PHP execution in upload directories or using appropriate server directives. 5. Employ Web Application Firewalls (WAF) with rules to detect and block malicious file uploads and suspicious payloads. 6. Conduct regular security audits of WordPress plugins and themes to identify and mitigate similar risks. 7. Educate site administrators on the risks of unrestricted file uploads and the importance of plugin hygiene. 8. Use Content Security Policy (CSP) headers to mitigate the impact of XSS attacks. 9. Monitor logs for unusual file upload activity and access patterns indicative of exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-17T17:58:42.026Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e0293a55ed4ed9984d532
Added to database: 1/7/2026, 6:52:03 AM
Last enriched: 1/7/2026, 7:09:13 AM
Last updated: 1/8/2026, 5:01:14 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22522: CWE-862 Missing Authorization in Munir Kamal Block Slider
MediumCVE-2026-22521: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in G5Theme Handmade Framework
HighCVE-2026-22519: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in BuddyDev MediaPress
MediumCVE-2026-22518: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencilwp X Addons for Elementor
MediumCVE-2026-21639: Vulnerability in Ubiquiti Inc airMAX AC
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.