CVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.
AI Analysis
Technical Summary
CVE-2025-8464 is a directory traversal vulnerability classified under CWE-23 that affects the Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress. This vulnerability exists in all versions up to and including 1.3.9.0 and is exploitable via the wpcf7_guest_user_id cookie. An unauthenticated attacker can manipulate this cookie to perform directory traversal attacks, enabling them to upload files outside the intended upload directory and delete files within the plugin's upload folder. The plugin enforces file type validation, restricting uploads to safe file types, which limits the potential for arbitrary code execution or uploading malicious scripts. Additionally, deletion capabilities are confined to the plugin's upload directory, reducing the risk of broader file system damage. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the limited impact on confidentiality and availability, but a partial impact on integrity. No public exploits have been reported yet, but the vulnerability poses a risk to websites using this plugin, especially those that rely on Contact Form 7 for file uploads. The lack of available patches at the time of publication necessitates immediate attention from administrators.
Potential Impact
The primary impact of CVE-2025-8464 is unauthorized modification of files related to the plugin's upload directory, which can affect the integrity of website content and potentially disrupt normal operations of the plugin. Although the vulnerability does not allow attackers to upload arbitrary file types, the ability to upload and delete files outside the intended directory could be leveraged to replace legitimate files or remove critical plugin files, potentially leading to denial of service or degraded functionality. Since the vulnerability does not affect confidentiality or availability directly, the risk is moderate but still significant for website integrity. Exploitation could facilitate further attacks if combined with other vulnerabilities or misconfigurations. Organizations relying on this plugin for handling user uploads may face reputational damage and operational issues if exploited. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-8464, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. Until a patch is released, administrators should consider disabling the Drag and Drop Multiple File Upload feature or the entire plugin if feasible. Implementing strict web application firewall (WAF) rules to monitor and block suspicious requests involving the wpcf7_guest_user_id cookie can help prevent exploitation attempts. Additionally, restricting file system permissions to limit write and delete access only to necessary directories can reduce the impact of unauthorized file operations. Regularly auditing uploaded files and plugin directories for unexpected changes is recommended. Employing security plugins that monitor file integrity and alert on unauthorized modifications can provide early detection. Finally, educating site administrators about this vulnerability and encouraging prompt response to suspicious activity is critical.
Affected Countries
United States, Germany, United Kingdom, India, Brazil, Canada, Australia, France, Japan, Netherlands
CVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
Description
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-8464 is a directory traversal vulnerability classified under CWE-23 that affects the Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress. This vulnerability exists in all versions up to and including 1.3.9.0 and is exploitable via the wpcf7_guest_user_id cookie. An unauthenticated attacker can manipulate this cookie to perform directory traversal attacks, enabling them to upload files outside the intended upload directory and delete files within the plugin's upload folder. The plugin enforces file type validation, restricting uploads to safe file types, which limits the potential for arbitrary code execution or uploading malicious scripts. Additionally, deletion capabilities are confined to the plugin's upload directory, reducing the risk of broader file system damage. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the limited impact on confidentiality and availability, but a partial impact on integrity. No public exploits have been reported yet, but the vulnerability poses a risk to websites using this plugin, especially those that rely on Contact Form 7 for file uploads. The lack of available patches at the time of publication necessitates immediate attention from administrators.
Potential Impact
The primary impact of CVE-2025-8464 is unauthorized modification of files related to the plugin's upload directory, which can affect the integrity of website content and potentially disrupt normal operations of the plugin. Although the vulnerability does not allow attackers to upload arbitrary file types, the ability to upload and delete files outside the intended directory could be leveraged to replace legitimate files or remove critical plugin files, potentially leading to denial of service or degraded functionality. Since the vulnerability does not affect confidentiality or availability directly, the risk is moderate but still significant for website integrity. Exploitation could facilitate further attacks if combined with other vulnerabilities or misconfigurations. Organizations relying on this plugin for handling user uploads may face reputational damage and operational issues if exploited. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2025-8464, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. Until a patch is released, administrators should consider disabling the Drag and Drop Multiple File Upload feature or the entire plugin if feasible. Implementing strict web application firewall (WAF) rules to monitor and block suspicious requests involving the wpcf7_guest_user_id cookie can help prevent exploitation attempts. Additionally, restricting file system permissions to limit write and delete access only to necessary directories can reduce the impact of unauthorized file operations. Regularly auditing uploaded files and plugin directories for unexpected changes is recommended. Employing security plugins that monitor file integrity and alert on unauthorized modifications can provide early detection. Finally, educating site administrators about this vulnerability and encouraging prompt response to suspicious activity is critical.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-01T15:47:19.302Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a0341fad5a09ad007601d4
Added to database: 8/16/2025, 7:32:47 AM
Last enriched: 2/26/2026, 5:10:29 PM
Last updated: 3/25/2026, 4:53:24 AM
Views: 157
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.