CVE-2025-5746

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress servers running vulnerable versions of the Drag and Drop Multiple File Upload (Pro) plugin. Attackers can potentially achieve remote code execution by uploading malicious files, though PHP execution may be blocked by .htaccess in some configurations. Affected users include WordPress administrators using either the standalone plugin or the PrintSpace theme bundle.

💻 Affected Systems

Products:
  • Drag and Drop Multiple File Upload (Pro) - WooCommerce plugin for WordPress
  • PrintSpace theme
Versions: Standalone plugin: all versions up to and including 1.7.1; Bundled with PrintSpace theme: versions 5.0 - 5.0.5
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in both standalone plugin and when bundled with PrintSpace theme. PHP execution may be blocked by .htaccess but can still work on certain server configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, malware deployment, and website defacement.

🟠

Likely Case

Arbitrary file upload enabling web shell installation, data exfiltration, or denial of service through disk space consumption.

🟢

If Mitigated

Limited impact if proper file type validation and server hardening prevent execution of uploaded malicious files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and has been publicly documented, making it easy for attackers to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Standalone: 1.7.2+; Bundled with PrintSpace theme: 5.0.6+

Vendor Advisory: https://www.codedropz.com/woocommerce-drag-drop-multiple-file-upload/

Restart Required: No

Instructions:

1. Update the plugin to version 1.7.2 or higher if using standalone version. 2. Update PrintSpace theme to version 5.0.6 or higher if using bundled version. 3. Verify update through WordPress admin panel.

🔧 Temporary Workarounds

Disable vulnerable plugin

linux

Temporarily disable the Drag and Drop Multiple File Upload (Pro) plugin until patched.

wp plugin deactivate drag-and-drop-multiple-file-upload-pro

Restrict file uploads via .htaccess

linux

Add .htaccess rules to block execution of uploaded files in vulnerable directories.

<FilesMatch "\.(php|php3|php4|php5|phtml|pl|py|jsp|asp|htm|html|shtml|sh|cgi)$">\n  Order Allow,Deny\n  Deny from all\n</FilesMatch>

🧯 If You Can't Patch

  • Disable the plugin immediately and remove all uploaded files from the server.
  • Implement web application firewall rules to block file upload attempts to vulnerable endpoints.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for plugin version. If using standalone plugin and version ≤1.7.1, or using PrintSpace theme bundle and version between 5.0-5.0.5, you are vulnerable.

Check Version:

wp plugin get drag-and-drop-multiple-file-upload-pro --field=version

Verify Fix Applied:

Confirm plugin version is ≥1.7.2 (standalone) or PrintSpace theme version is ≥5.0.6 (bundled). Test file upload functionality with malicious file types to ensure they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/uploads/drag-and-drop-multiple-file-upload-pro/ directory
  • POST requests to /wp-admin/admin-ajax.php with action=dnd_upload_cf7_upload_chunks

Network Indicators:

  • HTTP POST requests with file uploads to vulnerable endpoints from unauthenticated sources

SIEM Query:

source="web_server" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "dnd_upload_cf7_upload_chunks")

🔗 References

📤 Share & Export