CVE-2025-14457

3.7 LOW

📋 TL;DR

This vulnerability allows unauthenticated attackers to delete arbitrary files uploaded through the Drag and Drop Multiple File Upload for Contact Form 7 WordPress plugin when the 'Send attachments as links' setting is enabled. It affects all WordPress sites using this plugin up to version 1.3.9.2. The issue stems from missing ownership verification in file deletion functions.

💻 Affected Systems

Products:
  • Drag and Drop Multiple File Upload for Contact Form 7 WordPress plugin
Versions: All versions up to and including 1.3.9.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when 'Send attachments as links' setting is enabled. This setting is not enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical WordPress files, uploaded user content, or other important files, potentially causing website disruption, data loss, or service unavailability.

🟠

Likely Case

Attackers delete recently uploaded contact form attachments, causing user frustration and potential data loss for form submissions.

🟢

If Mitigated

With proper file permissions and backups, impact is limited to temporary file loss until restoration from backups.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the vulnerable setting to be enabled and knowledge of file paths. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.9.3

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3428236/drag-and-drop-multiple-file-upload-contact-form-7

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Drag and Drop Multiple File Upload for Contact Form 7'. 4. Click 'Update Now' if available, or download version 1.3.9.3+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable vulnerable setting

all

Turn off the 'Send attachments as links' setting in plugin configuration

Restrict file permissions

linux

Set restrictive permissions on upload directories to prevent deletion

chmod 755 /path/to/wordpress/wp-content/uploads/dnd-upload-cf7/

🧯 If You Can't Patch

  • Disable the 'Send attachments as links' setting immediately
  • Implement web application firewall rules to block suspicious file deletion requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Drag and Drop Multiple File Upload for Contact Form 7' version 1.3.9.2 or lower AND verify 'Send attachments as links' setting is enabled

Check Version:

wp plugin list --name='drag-and-drop-multiple-file-upload-contact-form-7' --field=version

Verify Fix Applied:

Confirm plugin version is 1.3.9.3 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=dnd_codedropz_upload_delete containing file paths
  • Unexpected 200 OK responses to unauthenticated file deletion requests

Network Indicators:

  • Unusual spikes in POST requests to admin-ajax.php endpoint
  • Pattern of file deletion requests from unauthenticated sources

SIEM Query:

source="web_server" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="dnd_codedropz_upload_delete" AND NOT user_agent="WordPress/*"

🔗 References

📤 Share & Export