Arbitrary File Move/Read Vulnerability in MW WP Form Plugin for WordPress
CVE-2026-5436

8.1HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
8 April 2026

What is CVE-2026-5436?

The MW WP Form plugin for WordPress features a vulnerability that allows attackers to manipulate files on the server. This stems from inadequate validation of the $name parameter from the file upload field in the generate_user_file_dirpath() function. An attacker can inject a key via the mwf_upload_files[] POST parameter, enabling unwanted file movement within the server. Particularly concerning is that if sensitive files like wp-config.php are targeted, it may lead to unauthorized remote code execution. This issue arises specifically when a file upload field is included in the form and the option to save inquiry data in the database is enabled.

Affected Version(s)

MW WP Form 0 <= 5.1.1

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sander Horsman
.