Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2485: CWE-502 Deserialization of Untrusted Data in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7

0
High
VulnerabilityCVE-2025-2485cvecve-2025-2485cwe-502
Published: Fri Mar 28 2025 (03/28/2025, 06:51:46 UTC)
Source: CVE
Vendor/Project: glenwpcoder
Product: Drag and Drop Multiple File Upload for Contact Form 7

Description

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.8.7 via deserialization of untrusted input from the 'dnd_upload_cf7_upload' function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with the file upload action. The Flamingo plugin must be installed and activated in order to exploit the vulnerability. The vulnerability was partially patched in version 1.3.8.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:54:22 UTC

Technical Analysis

CVE-2025-2485 is a deserialization vulnerability classified under CWE-502 affecting the Drag and Drop Multiple File Upload for Contact Form 7 WordPress plugin, versions up to and including 1.3.8.7. The vulnerability stems from unsafe deserialization of untrusted input in the 'dnd_upload_cf7_upload' function, which processes file uploads. Attackers can craft a PHAR (PHP Archive) file containing a serialized PHP object to inject malicious payloads. However, the plugin itself lacks a gadget chain (POP chain) necessary to achieve code execution or other malicious effects directly. The exploitability depends on the presence of other plugins or themes installed on the WordPress site that contain such POP chains. If such chains exist, attackers can leverage this vulnerability to perform destructive actions such as arbitrary file deletion, sensitive data exfiltration, or remote code execution. The attack vector is remote and unauthenticated but requires user interaction to upload the malicious file through a form that uses this plugin’s upload functionality. Additionally, the Flamingo plugin must be installed and activated for exploitation to succeed. The vulnerability was partially addressed in version 1.3.8.8, indicating that users should upgrade to at least this version or later. The CVSS v3.1 base score of 7.5 reflects the high impact on confidentiality, integrity, and availability, with attack complexity rated as high due to the need for a POP chain and user interaction. No known exploits are currently in the wild, but the risk remains significant for vulnerable WordPress sites with the required plugin ecosystem.

Potential Impact

If exploited, this vulnerability can severely compromise affected WordPress sites. The potential impacts include unauthorized deletion of files, exposure of sensitive data such as user credentials or configuration files, and remote code execution leading to full site takeover. This can result in defacement, data breaches, service disruption, and use of the compromised site as a launchpad for further attacks within an organization’s network. Since the vulnerability can be exploited by unauthenticated attackers via a publicly accessible form, it increases the attack surface significantly. The dependency on the presence of the Flamingo plugin and other plugins/themes with POP chains means that many WordPress sites with complex plugin environments are at risk. The partial patching status also implies that some attack vectors may remain open, prolonging the window of exposure. Organizations relying on this plugin for file uploads in contact forms should consider the risk of reputational damage, regulatory penalties for data breaches, and operational downtime.

Mitigation Recommendations

1. Immediately update the Drag and Drop Multiple File Upload for Contact Form 7 plugin to version 1.3.8.8 or later, where partial patches have been applied. 2. Audit all installed plugins and themes to identify any that contain POP chains or unsafe deserialization gadgets, and update or remove them if possible. 3. Disable or restrict file upload functionality on contact forms unless absolutely necessary, and implement strict file type and size validation. 4. If the Flamingo plugin is not required, consider uninstalling or deactivating it to reduce the attack surface. 5. Employ Web Application Firewalls (WAFs) with rules targeting PHP object injection and PHAR file uploads to detect and block malicious payloads. 6. Monitor logs for suspicious file upload attempts and anomalous activity related to the vulnerable plugin. 7. Implement least privilege principles for WordPress file permissions to limit the impact of potential file deletions or modifications. 8. Conduct regular security assessments and penetration tests focusing on deserialization vulnerabilities and chained exploits in the WordPress environment. 9. Educate site administrators about the risks of installing unvetted plugins and the importance of timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-17T23:34:34.529Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd9727

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 2/27/2026, 12:54:22 PM

Last updated: 3/26/2026, 8:43:53 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses