CVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.
AI Analysis
Technical Summary
CVE-2025-8464 is a directory traversal vulnerability (CWE-23) affecting the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' developed by glenwpcoder. This vulnerability exists in all versions up to and including 1.3.9.0. The flaw is triggered via the wpcf7_guest_user_id cookie, which is used by the plugin to manage file uploads. An unauthenticated attacker can exploit this vulnerability to upload and delete files outside the intended upload directory. However, the impact is somewhat mitigated by the plugin's file type validation, which restricts uploads to safe file types, and by limiting deletion capabilities to the plugin's uploads folder. The vulnerability does not affect confidentiality or availability directly but impacts integrity by allowing unauthorized modification of files. The CVSS v3.1 score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and affects integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been published yet. This vulnerability could be leveraged to manipulate website content or potentially facilitate further attacks if combined with other vulnerabilities or misconfigurations in the hosting environment.
Potential Impact
For European organizations using WordPress sites with the vulnerable plugin, this vulnerability poses a moderate risk. Attackers could upload or delete files within the plugin's upload directories, potentially defacing websites, injecting malicious scripts, or disrupting normal operations. Although file type validation limits the risk of arbitrary code execution, attackers might still upload web shells disguised as allowed file types or delete critical files related to the plugin's functionality, causing service degradation. This could lead to reputational damage, loss of user trust, and potential compliance issues under regulations like GDPR if personal data integrity is compromised. Organizations with high-traffic or customer-facing WordPress sites are particularly at risk. The unauthenticated nature of the exploit increases the threat level, as no credentials are needed to attempt exploitation. However, the lack of known active exploitation and the limited scope of file deletion reduce the immediate criticality. Still, the vulnerability should be addressed promptly to avoid escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin and verify its version. Until an official patch is released, organizations should consider the following mitigations: 1) Disable or remove the vulnerable plugin if it is not essential. 2) Implement web application firewall (WAF) rules to block suspicious requests containing directory traversal patterns or anomalous cookie values targeting wpcf7_guest_user_id. 3) Restrict file system permissions for the web server user to limit write and delete access strictly to necessary directories, preventing unauthorized file manipulation outside the plugin's scope. 4) Monitor web server logs for unusual upload or deletion activity, especially related to the plugin's upload folders. 5) Employ intrusion detection systems (IDS) to alert on exploitation attempts. 6) Educate site administrators on the risks and ensure timely updates once patches become available. 7) Consider isolating WordPress instances or running them in containerized environments to reduce the blast radius of potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
Description
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.
AI-Powered Analysis
Technical Analysis
CVE-2025-8464 is a directory traversal vulnerability (CWE-23) affecting the WordPress plugin 'Drag and Drop Multiple File Upload for Contact Form 7' developed by glenwpcoder. This vulnerability exists in all versions up to and including 1.3.9.0. The flaw is triggered via the wpcf7_guest_user_id cookie, which is used by the plugin to manage file uploads. An unauthenticated attacker can exploit this vulnerability to upload and delete files outside the intended upload directory. However, the impact is somewhat mitigated by the plugin's file type validation, which restricts uploads to safe file types, and by limiting deletion capabilities to the plugin's uploads folder. The vulnerability does not affect confidentiality or availability directly but impacts integrity by allowing unauthorized modification of files. The CVSS v3.1 score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and affects integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been published yet. This vulnerability could be leveraged to manipulate website content or potentially facilitate further attacks if combined with other vulnerabilities or misconfigurations in the hosting environment.
Potential Impact
For European organizations using WordPress sites with the vulnerable plugin, this vulnerability poses a moderate risk. Attackers could upload or delete files within the plugin's upload directories, potentially defacing websites, injecting malicious scripts, or disrupting normal operations. Although file type validation limits the risk of arbitrary code execution, attackers might still upload web shells disguised as allowed file types or delete critical files related to the plugin's functionality, causing service degradation. This could lead to reputational damage, loss of user trust, and potential compliance issues under regulations like GDPR if personal data integrity is compromised. Organizations with high-traffic or customer-facing WordPress sites are particularly at risk. The unauthenticated nature of the exploit increases the threat level, as no credentials are needed to attempt exploitation. However, the lack of known active exploitation and the limited scope of file deletion reduce the immediate criticality. Still, the vulnerability should be addressed promptly to avoid escalation or chaining with other vulnerabilities.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the 'Drag and Drop Multiple File Upload for Contact Form 7' plugin and verify its version. Until an official patch is released, organizations should consider the following mitigations: 1) Disable or remove the vulnerable plugin if it is not essential. 2) Implement web application firewall (WAF) rules to block suspicious requests containing directory traversal patterns or anomalous cookie values targeting wpcf7_guest_user_id. 3) Restrict file system permissions for the web server user to limit write and delete access strictly to necessary directories, preventing unauthorized file manipulation outside the plugin's scope. 4) Monitor web server logs for unusual upload or deletion activity, especially related to the plugin's upload folders. 5) Employ intrusion detection systems (IDS) to alert on exploitation attempts. 6) Educate site administrators on the risks and ensure timely updates once patches become available. 7) Consider isolating WordPress instances or running them in containerized environments to reduce the blast radius of potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-01T15:47:19.302Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a0341fad5a09ad007601d4
Added to database: 8/16/2025, 7:32:47 AM
Last enriched: 8/16/2025, 7:47:54 AM
Last updated: 8/16/2025, 9:55:29 PM
Views: 8
Related Threats
CVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9087: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.