Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader

0
High
VulnerabilityCVE-2026-1756cvecve-2026-1756cwe-434
Published: Wed Feb 04 2026 (02/04/2026, 06:42:37 UTC)
Source: CVE Database V5
Vendor/Project: seezee
Product: WP FOFT Loader

Description

The WP FOFT Loader plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WP_FOFT_Loader_Mimes::file_and_ext' function in all versions up to, and including, 2.1.39. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:19:49 UTC

Technical Analysis

CVE-2026-1756 is a critical security vulnerability identified in the WP FOFT Loader plugin for WordPress, affecting all versions up to 2.1.39. The root cause is improper validation of uploaded file types within the 'WP_FOFT_Loader_Mimes::file_and_ext' function, which fails to restrict uploads to safe file formats. This weakness allows authenticated users with Author-level permissions or higher to upload arbitrary files, including potentially malicious scripts, to the server hosting the WordPress site. Because WordPress plugins often run with elevated privileges and have access to the web server's file system, this vulnerability can be leveraged to achieve remote code execution (RCE). The CVSS 3.1 base score of 8.8 indicates a high severity, with an attack vector over the network, low attack complexity, and requiring privileges but no user interaction. The vulnerability's scope includes confidentiality, integrity, and availability impacts, as attackers can execute arbitrary code, modify site content, or disrupt services. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant risk. The lack of an official patch at the time of publication necessitates immediate mitigation steps by site administrators. This vulnerability highlights the critical importance of strict file type validation in web applications, especially those allowing file uploads by authenticated users.

Potential Impact

The impact of CVE-2026-1756 is substantial for organizations running WordPress sites with the vulnerable WP FOFT Loader plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the web server. This can result in full site compromise, data theft, defacement, installation of backdoors, or pivoting to internal networks. The confidentiality of sensitive data stored or processed by the website can be breached, integrity of website content and configurations can be altered, and availability can be disrupted through denial-of-service or destructive actions. Since the vulnerability requires only Author-level access, attackers who compromise or register such accounts can escalate their privileges to execute code remotely. This threat is particularly critical for organizations relying on WordPress for business-critical applications, e-commerce, or handling sensitive customer data. The widespread use of WordPress globally increases the potential attack surface, making this vulnerability a significant risk to many organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2026-1756, organizations should immediately verify if their WordPress installations use the WP FOFT Loader plugin and identify the version in use. Since no official patch is currently available, administrators should consider the following specific actions: 1) Restrict plugin usage by limiting Author-level and higher privileges only to trusted users to reduce the risk of exploitation. 2) Implement additional server-side file upload restrictions, such as configuring web server rules (e.g., .htaccess or nginx configurations) to block execution of uploaded files in upload directories. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting this plugin. 4) Monitor logs for unusual file upload activity or unexpected file types being uploaded. 5) Temporarily disable or uninstall the WP FOFT Loader plugin if it is not essential to site functionality. 6) Follow the plugin vendor’s updates closely and apply official patches as soon as they become available. 7) Conduct regular security audits and vulnerability scans to detect similar issues proactively. These targeted mitigations go beyond generic advice by focusing on privilege management, server configuration, and active monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-02T10:22:57.700Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982ee78f9fa50a62f7260f6

Added to database: 2/4/2026, 7:00:08 AM

Last enriched: 2/27/2026, 9:19:49 AM

Last updated: 3/22/2026, 4:15:49 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses