Cyber Posture

CVE-2025-2328

High

Published: 28 March 2025

Published
28 March 2025
Modified
12 August 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0395 88.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may delete files left behind by the actions of their intrusion activity.

Security Summary

CVE-2025-2328 affects the Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress, specifically in all versions up to and including 1.3.8.7. The vulnerability stems from insufficient file path validation in the 'dnd_remove_uploaded_files' function, enabling arbitrary file deletion. This issue, classified under CWE-22 (Path Traversal), carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2025-03-28.

Unauthenticated attackers can exploit this by uploading files via the plugin and embedding arbitrary file paths, such as ../../../../wp-config.php, into the metadata stored on the server. Exploitation requires the Flamingo plugin to be installed and activated, as it handles message storage and deletion. When an administrator reviews and deletes the contact form message containing the malicious paths, the plugin executes the deletion, potentially allowing attackers to delete critical files and achieve remote code execution.

Advisories, including those from Wordfence, detail the vulnerability and reference a patch in WordPress plugin changeset 3261964. Mitigation involves updating to a patched version beyond 1.3.8.7, as indicated in the plugin's source code changes at line 153 of dnd-upload-cf7.php. Security practitioners should verify Flamingo plugin usage and monitor for unauthorized file uploads in Contact Form 7 submissions.

Details

CWE(s)
CWE-22

Affected Products

codedropz
drag and drop multiple file upload - contact form 7
≤ 1.3.8.8

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Vulnerability in public-facing WordPress plugin enables exploitation via T1190; directly facilitates arbitrary file deletion via path traversal in T1070.004.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References