CVE-2025-14344

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers running the vulnerable Multi Uploader for Gravity Forms plugin. It affects all WordPress sites using this plugin up to version 1.1.7, potentially leading to service disruption or data loss.

💻 Affected Systems

Products:
  • Multi Uploader for Gravity Forms WordPress plugin
Versions: All versions up to and including 1.1.7
Operating Systems: Any OS running WordPress (Linux, Windows, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and active on WordPress; no authentication needed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers delete critical system files (e.g., wp-config.php, .htaccess) or database files, causing complete site compromise, data loss, or server downtime.

🟠

Likely Case

Attackers delete WordPress core files or plugin files, disrupting website functionality or defacing the site.

🟢

If Mitigated

If file permissions are restrictive or the plugin is disabled, impact is limited to accessible files within the web root.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via crafted HTTP requests to the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/gf-multi-uploader/tags/1.1.8/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins > Installed Plugins. 3. Find 'Multi Uploader for Gravity Forms' and update to version 1.1.8 or later. 4. Alternatively, download the latest version from the WordPress plugin repository and replace the plugin files manually.

🔧 Temporary Workarounds

Disable the plugin

all

Temporarily deactivate the vulnerable plugin to prevent exploitation.

wp plugin deactivate gf-multi-uploader

Restrict file deletion permissions

linux

Set strict file permissions on critical directories to limit damage.

chmod 644 wp-config.php
chmod 755 wp-content/uploads/

🧯 If You Can't Patch

  • Disable the plugin immediately via WordPress admin or command line.
  • Implement web application firewall (WAF) rules to block requests to the vulnerable 'plupload_ajax_delete_file' endpoint.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 1.1.7 or lower, it is vulnerable.

Check Version:

wp plugin get gf-multi-uploader --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 1.1.8 or higher in the WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to '/wp-admin/admin-ajax.php' with action 'plupload_ajax_delete_file' and unusual file paths in parameters.

Network Indicators:

  • Unusual outbound traffic patterns indicating file deletion attempts or site errors.

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND post_data LIKE "%plupload_ajax_delete_file%"

🔗 References

📤 Share & Export