CVE-2025-2328

8.8 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers using the Drag and Drop Multiple File Upload for Contact Form 7 plugin. Attackers can manipulate file paths to delete critical system files like wp-config.php, potentially leading to remote code execution when administrators delete messages. WordPress sites using this plugin up to version 1.3.8.7 with the Flamingo plugin installed are affected.

💻 Affected Systems

Products:
  • Drag and Drop Multiple File Upload for Contact Form 7 WordPress plugin
Versions: All versions up to and including 1.3.8.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Flamingo plugin to be installed and activated for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise via wp-config.php deletion leading to database credentials exposure, followed by remote code execution and full server takeover.

🟠

Likely Case

Critical WordPress files deleted causing site outage, configuration exposure, and potential backdoor installation.

🟢

If Mitigated

File deletion limited to non-critical directories if proper file permissions and web server restrictions are configured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires attacker to upload files and wait for administrator to delete messages containing those files

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.8.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3261964/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Drag and Drop Multiple File Upload for Contact Form 7'. 4. Click 'Update Now' if available, or manually update to version 1.3.8.8+. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable Flamingo Plugin

all

Temporarily deactivate the Flamingo plugin to prevent exploitation while patching

Restrict File Upload Directory Permissions

linux

Set strict permissions on WordPress upload directories to prevent traversal

chmod 755 /path/to/wp-content/uploads/
chown www-data:www-data /path/to/wp-content/uploads/

🧯 If You Can't Patch

  • Deactivate the vulnerable plugin immediately
  • Implement web application firewall rules to block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Drag and Drop Multiple File Upload for Contact Form 7' version 1.3.8.7 or earlier

Check Version:

wp plugin list --name='Drag and Drop Multiple File Upload for Contact Form 7' --field=version

Verify Fix Applied:

Confirm plugin version is 1.3.8.8 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file deletion attempts with ../ patterns
  • Unauthenticated requests to dnd_remove_uploaded_files function

Network Indicators:

  • POST requests containing file paths with directory traversal sequences

SIEM Query:

source="web_server" AND (uri="*/wp-admin/admin-ajax.php*" AND post_data="*dnd_remove_uploaded_files*" AND post_data="*../*")

🔗 References

📤 Share & Export