CVE-2026-5718

| EUVD-2026-23459 HIGH
2026-04-17 Wordfence GHSA-xj7v-jqv6-v48w
8.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 17, 2026 - 18:44 vuln.today

DescriptionNVD

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist types are configured, which replaces the default dangerous extension denylist instead of merging with it, and the wpcf7_antiscript_file_name() sanitization function being bypassed for filenames containing non-ASCII characters. This makes it possible for unauthenticated attackers to upload arbitrary files, such as PHP files, to the server, which can be leveraged to achieve remote code execution.

AnalysisAI

Remote code execution in Drag and Drop Multiple File Upload for Contact Form 7 plugin (WordPress) versions ≤1.3.9.6 allows unauthenticated attackers to upload PHP webshells via dual file validation weaknesses. The plugin's custom blacklist configuration overwrites default protections instead of merging, and non-ASCII filenames bypass the wpcf7_antiscript_file_name() sanitizer. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Disable or remove the Drag and Drop Multiple File Upload for Contact Form 7 plugin from all WordPress instances running versions ≤1.3.9.6; verify no unauthorized files were uploaded via file integrity checks. Within 7 days: Update to plugin version >1.3.9.6 if available, or implement a permanent alternative file upload solution; audit web server logs (past 90 days minimum) for suspicious upload activity and PHP execution in upload directories. …

Sign in for detailed remediation steps.

Share

CVE-2026-5718 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy