Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14842: CWE-434 Unrestricted Upload of File with Dangerous Type in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7

0
Medium
VulnerabilityCVE-2025-14842cvecve-2025-14842cwe-434
Published: Wed Jan 07 2026 (01/07/2026, 06:36:03 UTC)
Source: CVE Database V5
Vendor/Project: glenwpcoder
Product: Drag and Drop Multiple File Upload for Contact Form 7

Description

The Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress is vulnerable to limited upload of files with a dangerous type in all versions up to, and including, 1.3.9.2. This is due to the plugin not blocking .phar and .svg files. This makes it possible for unauthenticated attackers to upload arbitrary .phar or .svg files containing malicious PHP or JavaScript code. Malicious PHP code can be used to achieve remote code execution on the server via direct file access, if the server is configured to execute .phar files as PHP. The upload of .svg files allows for Stored Cross-Site Scripting under certain circumstances.

AI-Powered Analysis

AILast updated: 01/07/2026, 07:09:13 UTC

Technical Analysis

CVE-2025-14842 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the 'Drag and Drop Multiple File Upload for Contact Form 7' WordPress plugin by glenwpcoder. This plugin, widely used to enhance file upload capabilities in Contact Form 7, fails to properly restrict uploads of certain file types, specifically .phar and .svg files. The vulnerability affects all versions up to and including 1.3.9.2. Attackers can exploit this by uploading malicious .phar files containing PHP code or .svg files containing JavaScript payloads. If the server is configured to execute .phar files as PHP scripts, this can lead to remote code execution (RCE), allowing attackers to run arbitrary commands on the server, potentially compromising the entire web application and underlying system. The .svg files can be used to perform stored cross-site scripting (XSS) attacks, which can steal user credentials, hijack sessions, or perform actions on behalf of authenticated users. The attack vector is network-based and does not require authentication, but user interaction is needed to trigger the XSS. The vulnerability has a CVSS v3.1 base score of 6.1, indicating medium severity. No known exploits are reported in the wild yet, but the risk remains significant due to the ease of file upload and potential impact. The vulnerability highlights the importance of strict file type validation and secure server configurations in WordPress environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those running WordPress sites with the affected plugin installed. The ability for unauthenticated attackers to upload malicious files can lead to remote code execution, which may result in full server compromise, data breaches, defacement, or use of the server as a pivot point for further attacks. Stored XSS via .svg files can compromise user accounts, leak sensitive information, and damage organizational reputation. Public-facing websites, e-commerce platforms, and government portals are particularly at risk. The impact extends to confidentiality, integrity, and availability of affected systems. Given the widespread use of WordPress in Europe, especially in small and medium enterprises and public sector websites, the vulnerability could be exploited to disrupt services or steal sensitive data. Moreover, GDPR implications arise if personal data is compromised, potentially leading to regulatory penalties.

Mitigation Recommendations

1. Immediately monitor for plugin updates and apply patches from the vendor once available. 2. Temporarily disable or remove the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin if patching is not feasible. 3. Implement strict server-side file type validation to block uploads of .phar, .svg, and other potentially dangerous file types. 4. Configure the web server to never execute .phar files as PHP scripts, for example by disabling PHP execution in upload directories or using appropriate server directives. 5. Employ Web Application Firewalls (WAF) with rules to detect and block malicious file uploads and suspicious payloads. 6. Conduct regular security audits of WordPress plugins and themes to identify and mitigate similar risks. 7. Educate site administrators on the risks of unrestricted file uploads and the importance of plugin hygiene. 8. Use Content Security Policy (CSP) headers to mitigate the impact of XSS attacks. 9. Monitor logs for unusual file upload activity and access patterns indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-17T17:58:42.026Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e0293a55ed4ed9984d532

Added to database: 1/7/2026, 6:52:03 AM

Last enriched: 1/7/2026, 7:09:13 AM

Last updated: 1/8/2026, 5:01:14 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats