Arbitrary File Upload Vulnerability in Drag and Drop Multiple File Upload for Contact Form 7 by WordPress
CVE-2025-3515
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 17 June 2025
Badges
What is CVE-2025-3515?
CVE-2025-3515 is a critical vulnerability identified in the Drag and Drop Multiple File Upload plugin for Contact Form 7, a widely used tool within the WordPress ecosystem. This vulnerability stems from insufficient file type validation, which affects all versions up to and including 1.3.8.9. Due to this oversight, unauthenticated attackers can circumvent the plugin's file type restrictions, enabling them to upload potentially dangerous files, such as .phar files, onto the server. If a server is configured to treat these .phar files as executable PHP scripts, it can lead to remote code execution. This situation poses a significant risk to organizations using the plugin because it could allow attackers to execute arbitrary code on the server, potentially compromising data integrity and confidentiality.
Potential Impact of CVE-2025-3515
-
Remote Code Execution: The primary threat of CVE-2025-3515 is the ability for attackers to execute arbitrary code on the server. This could allow them to take full control of the system, leading to unauthorized access to sensitive information and resources.
-
Data Breach Potential: With the capability for remote code execution, attackers can manipulate, steal, or corrupt sensitive data stored on the server. This poses a severe risk to organizations, especially those handling personal or financial information.
-
Increased Exposure to Ransomware Attacks: The vulnerability can serve as an entry point for ransomware groups to deploy malicious payloads. By exploiting this flaw, attackers can gain access to systems, encrypt files, and demand a ransom, significantly disrupting business operations and incurring financial losses.
Affected Version(s)
Drag and Drop Multiple File Upload for Contact Form 7 * <= 1.3.8.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved