The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 16 Aug 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder. | |
Title | Drag and Drop Multiple File Upload for Contact Form 7 <= 1.3.9.0 - Directory Traversal via `wpcf7_guest_user_id` Cookie | |
Weaknesses | CWE-23 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-16T07:25:28.619Z
Updated: 2025-08-18T17:51:17.240Z
Reserved: 2025-08-01T15:47:19.302Z
Link: CVE-2025-8464

Updated: 2025-08-18T17:51:06.287Z

Status : Awaiting Analysis
Published: 2025-08-16T08:15:27.493
Modified: 2025-08-18T20:16:28.750
Link: CVE-2025-8464

No data.