EUVD-2026-18124

| CVE-2026-4347 HIGH
2026-04-02 Wordfence GHSA-2mhf-8wh4-g2p3
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Apr 02, 2026 - 05:45 euvd
EUVD-2026-18124
Analysis Generated
Apr 02, 2026 - 05:45 vuln.today
CVE Published
Apr 02, 2026 - 05:28 nvd
HIGH 8.1

Description

The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the 'generate_user_filepath' function and the 'move_temp_file_to_upload_dir' function in all versions up to, and including, 5.1.0. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). The vulnerability is only exploitable if a file upload field is added to the form and the “Saving inquiry data in database” option is enabled.

Analysis

Arbitrary file movement in MW WP Form plugin for WordPress (all versions ≤5.1.0) allows unauthenticated remote attackers to relocate server files and achieve remote code execution by moving critical files like wp-config.php. Exploitation requires a form with file upload capability and database inquiry storage enabled. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: audit all WordPress instances for MW WP Form plugin presence and version (check wp-content/plugins directory and admin dashboard). Within 7 days: immediately disable or remove MW WP Form plugin versions ≤5.1.0; if the plugin is business-critical, restrict file upload form access to authenticated users only via web application firewall rules and disable database inquiry storage in plugin settings. …

Sign in for detailed remediation steps.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +40
POC: 0

Share

EUVD-2026-18124 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy