Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7

0
Medium
VulnerabilityCVE-2025-8464cvecve-2025-8464cwe-23
Published: Sat Aug 16 2025 (08/16/2025, 07:25:28 UTC)
Source: CVE Database V5
Vendor/Project: glenwpcoder
Product: Drag and Drop Multiple File Upload for Contact Form 7

Description

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:10:29 UTC

Technical Analysis

CVE-2025-8464 is a directory traversal vulnerability classified under CWE-23 that affects the Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress. This vulnerability exists in all versions up to and including 1.3.9.0 and is exploitable via the wpcf7_guest_user_id cookie. An unauthenticated attacker can manipulate this cookie to perform directory traversal attacks, enabling them to upload files outside the intended upload directory and delete files within the plugin's upload folder. The plugin enforces file type validation, restricting uploads to safe file types, which limits the potential for arbitrary code execution or uploading malicious scripts. Additionally, deletion capabilities are confined to the plugin's upload directory, reducing the risk of broader file system damage. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the limited impact on confidentiality and availability, but a partial impact on integrity. No public exploits have been reported yet, but the vulnerability poses a risk to websites using this plugin, especially those that rely on Contact Form 7 for file uploads. The lack of available patches at the time of publication necessitates immediate attention from administrators.

Potential Impact

The primary impact of CVE-2025-8464 is unauthorized modification of files related to the plugin's upload directory, which can affect the integrity of website content and potentially disrupt normal operations of the plugin. Although the vulnerability does not allow attackers to upload arbitrary file types, the ability to upload and delete files outside the intended directory could be leveraged to replace legitimate files or remove critical plugin files, potentially leading to denial of service or degraded functionality. Since the vulnerability does not affect confidentiality or availability directly, the risk is moderate but still significant for website integrity. Exploitation could facilitate further attacks if combined with other vulnerabilities or misconfigurations. Organizations relying on this plugin for handling user uploads may face reputational damage and operational issues if exploited. The lack of authentication and user interaction requirements increases the risk of automated exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-8464, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. Until a patch is released, administrators should consider disabling the Drag and Drop Multiple File Upload feature or the entire plugin if feasible. Implementing strict web application firewall (WAF) rules to monitor and block suspicious requests involving the wpcf7_guest_user_id cookie can help prevent exploitation attempts. Additionally, restricting file system permissions to limit write and delete access only to necessary directories can reduce the impact of unauthorized file operations. Regularly auditing uploaded files and plugin directories for unexpected changes is recommended. Employing security plugins that monitor file integrity and alert on unauthorized modifications can provide early detection. Finally, educating site administrators about this vulnerability and encouraging prompt response to suspicious activity is critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-01T15:47:19.302Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a0341fad5a09ad007601d4

Added to database: 8/16/2025, 7:32:47 AM

Last enriched: 2/26/2026, 5:10:29 PM

Last updated: 3/25/2026, 4:53:24 AM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses