CVE-2025-8464
📋 TL;DR
This vulnerability in the Drag and Drop Multiple File Upload for Contact Form 7 WordPress plugin allows unauthenticated attackers to perform directory traversal attacks via the wpcf7_guest_user_id cookie. Attackers can upload and delete files outside intended directories, though impact is limited as only safe file types can be uploaded and deletion is restricted to the plugin's uploads folder. All WordPress sites using this plugin up to version 1.3.9.0 are affected.
💻 Affected Systems
- Drag and Drop Multiple File Upload for Contact Form 7 WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could delete legitimate files in the plugin's uploads directory, potentially disrupting form functionality or website operations.
Likely Case
Limited file manipulation within the plugin's uploads directory, potentially causing minor service disruption or data loss.
If Mitigated
No impact if proper file type validation is maintained and plugin uploads directory is isolated.
🎯 Exploit Status
Exploitation requires manipulating the wpcf7_guest_user_id cookie to perform directory traversal.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.3.9.0
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Drag and Drop Multiple File Upload for Contact Form 7'. 4. Click 'Update Now' if available, or manually update to latest version. 5. Verify plugin is updated to version after 1.3.9.0.
🔧 Temporary Workarounds
Disable vulnerable plugin
WordPressTemporarily disable the plugin until patched version is available
wp plugin deactivate drag-and-drop-multiple-file-upload-contact-form-7
Restrict cookie manipulation
allImplement web application firewall rules to block suspicious wpcf7_guest_user_id cookie values
🧯 If You Can't Patch
- Disable the Drag and Drop Multiple File Upload for Contact Form 7 plugin immediately
- Implement strict file upload validation at web server level to prevent directory traversal
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for 'Drag and Drop Multiple File Upload for Contact Form 7' version 1.3.9.0 or earlier
Check Version:
wp plugin get drag-and-drop-multiple-file-upload-contact-form-7 --field=version
Verify Fix Applied:
Verify plugin version is higher than 1.3.9.0 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual file operations in plugin uploads directory
- Multiple failed upload attempts with manipulated cookie values
- wpcf7_guest_user_id cookie containing path traversal sequences (../)
Network Indicators:
- HTTP requests with wpcf7_guest_user_id cookie containing path traversal sequences
- Unusual file upload patterns to contact form endpoints
SIEM Query:
source="web_logs" AND (cookie="*wpcf7_guest_user_id*../*" OR uri="*/wp-content/uploads/drag-and-drop-multiple-file-upload-contact-form-7/*")
🔗 References
- https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L1018
- https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L1050
- https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L77
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3344512%40drag-and-drop-multiple-file-upload-contact-form-7&new=3344512%40drag-and-drop-multiple-file-upload-contact-form-7&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/17f7be7f-f675-4c9f-a7b3-525a3c3c5775?source=cve