Security Alert Summary
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress contains an arbitrary file upload vulnerability in versions up to and including 1.3.9.6. Insufficient file type validation when custom blacklist types are configured, combined with a bypass of the wpcf7_antiscript_file_name() sanitization for filenames containing non-ASCII characters, can allow unauthenticated attackers to upload arbitrary files, including PHP files, which may be leveraged to achieve remote code execution.
CVE Details
- CVE ID: CVE-2026-5718
- Affected component: Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress
- Affected versions: Versions up to and including 1.3.9.6
- Published: April 17, 2026, 6:16:32 PM UTC
- Last modified: April 17, 2026, 6:16:32 PM UTC
- CVSS v3.1: Base score 8.1, Severity: HIGH, Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - Attack details from CVSS: Network attack vector; Attack Complexity: High; Privileges Required: None; User Interaction: None; Scope: Unchanged
- Primary impact: Confidentiality: High; Integrity: High; Availability: High
- Weakness: CWE-434 (Unrestricted Upload of File with Dangerous Type)
Technical Details
The vulnerability is caused by insufficient file type validation in the plugin when site administrators configure custom blacklist (denylist) types. Instead of merging custom blacklist entries with the plugin’s default denylist of dangerous extensions, the custom configuration replaces the default list, removing protections for certain file extensions. In addition, the plugin’s filename sanitization function, wpcf7_antiscript_file_name(), can be bypassed when filenames include non-ASCII characters. Together these issues allow unauthenticated attackers to upload arbitrary files, including server-executable files such as PHP scripts.
Because uploaded files may be stored on the server and executed by the web server, an attacker who successfully uploads a PHP file could leverage that upload to run arbitrary code on the site, leading to data exposure, content modification, or further unauthorized actions. The description and analysis restrict details to the named function and the file type validation behavior; no additional endpoints or internal checks are described in the provided data.
How This Could Impact Your Website
Consider a typical WordPress setup with a site owner, internal staff who manage content, and an external contractor who provides files via a contact form. If the site uses the affected plugin and remains unpatched, an unauthenticated attacker could submit specially crafted uploads through a contact form to place executable files on the server. Practical consequences include:
- Potential execution of uploaded code leading to data access or modification that affects content integrity and availability.
- Exposure of sensitive files or backups if the attacker is able to access uploaded or adjacent directories, increasing the risk of targeted phishing or social engineering against internal staff.
- Service disruption from defacement, malware, or removal of site content.
If youre unsure whether your site is affected or how to assess your current user roles and plugins, it may be worth having a professional review your setup.
Recommended Actions
- Update the affected plugin as soon as a patched version is available.
- Review and reduce unnecessary user roles, especially contributors and other upload-capable roles.
- Enforce strong passwords and enable two-factor authentication for editors and administrators.
- Remove unused or unmaintained plugins that increase your attack surface.
- Monitor site activity and server logs for unusual file uploads, unexpected PHP files, or other signs of compromise.
If youd like help reviewing your plugins, user roles, or overall WordPress security posture, our team at Freshy is happy to help.
References
- https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.6/inc/dnd-upload-cf7.php#L62
- https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.6/inc/dnd-upload-cf7.php#L883
- https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.6/inc/dnd-upload-cf7.php#L970
- https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.6/inc/dnd-upload-cf7.php#L987
- https://plugins.trac.wordpress.org/changeset/3508522/drag-and-drop-multiple-file-upload-contact-form-7
- https://www.wordfence.com/threat-intel/vulnerabilities/id/38f95d40-a6d4-429c-9872-9d2531e942eb?source=cve