CVE-2026-5718
Published: 17 April 2026
Description
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist…
more
types are configured, which replaces the default dangerous extension denylist instead of merging with it, and the wpcf7_antiscript_file_name() sanitization function being bypassed for filenames containing non-ASCII characters. This makes it possible for unauthenticated attackers to upload arbitrary files, such as PHP files, to the server, which can be leveraged to achieve remote code execution.
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly mitigates the CVE by requiring patching of the vulnerable WordPress plugin version up to 1.3.9.6 to fix the file validation and sanitization flaws.
Information input validation enforces proper checking of file types and names, countering the insufficient blacklist merging and non-ASCII sanitization bypass in the plugin.
Information input restrictions at upload boundaries limit dangerous file types and filenames, preventing unauthenticated arbitrary file uploads leading to RCE.
Security SummaryAI
CVE-2026-5718 is an arbitrary file upload vulnerability affecting the Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress in versions up to and including 1.3.9.6. The issue stems from insufficient file type validation when custom blacklist types are configured, as this configuration replaces the default dangerous extension denylist rather than merging with it. Additionally, the wpcf7_antiscript_file_name() sanitization function can be bypassed using filenames with non-ASCII characters. The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), published on 2026-04-17.
Unauthenticated attackers can exploit this vulnerability over the network with high attack complexity to upload arbitrary files, such as PHP files, to the server. Successful exploitation enables remote code execution, potentially compromising the entire WordPress site.
References point to specific code locations in the vulnerable version 1.3.9.6, including lines 62, 883, 970, and 987 in inc/dnd-upload-cf7.php, highlighting the flawed validation and sanitization logic. Mitigation is addressed in changeset 3508522 for the plugin, indicating that updating to a patched version resolves the issue.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in public-facing WordPress plugin enables T1190 (Exploit Public-Facing Application) for unauthenticated RCE and facilitates T1100 (Web Shell) via PHP file uploads.