CVE-2026-1730
Published: 03 February 2026
Description
The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Author-level…
more
access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of file upload inputs to enforce proper file type checks, addressing the core flaw in incorrect file type validation.
Mandates timely identification, reporting, and correction of flaws like this arbitrary file upload vulnerability through plugin patching.
Restricts and scans user-installed software such as vulnerable WordPress plugins prior to deployment, preventing exploitation via unapproved components.
Security SummaryAI
CVE-2026-1730 is an arbitrary file upload vulnerability in the OS DataHub Maps plugin for WordPress, affecting all versions up to and including 1.8.3. The flaw arises from incorrect file type validation in the `OS_DataHub_Maps_Admin::add_file_and_ext` function, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
Authenticated attackers with Author-level access or higher can exploit the vulnerability over the network with low complexity and no user interaction required. By uploading arbitrary files to the affected WordPress site's server, they may achieve remote code execution, compromising the server hosting the plugin.
Advisories point to mitigation through updating the plugin, with a fix reflected in WordPress plugin repository changeset 3452323. Relevant code locations are detailed in the plugin's trac revisions, such as lines 51 and 67 in `osmap-admin.php` and line 87 in `os-datahub-maps.php`. Further analysis is available in the Wordfence threat intelligence report.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload vulnerability in WordPress plugin enables remote code execution on a public-facing web application, directly facilitating T1190: Exploit Public-Facing Application.