The Contact Form 7 plugin for WordPress allows Unrestricted File Upload and remote code execution due to a filename issue
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
![]() | WordPress Contact Form 7 Plugin < 5.3.2 RCE Vulnerability | 22 Dec 202000:00 | β | openvas |
![]() | Wordpress contact-form-7 code issue vulnerability | 20 Jan 202100:00 | β | cnvd |
![]() | Contact Form 7 < 5.3.2 - Unrestricted File Upload | 17 Dec 202000:00 | β | wpexploit |
![]() | WordPress Contact Form 7 - Unrestricted File Upload | 21 Mar 202117:51 | β | nuclei |
![]() | Exploit for Unrestricted Upload of File with Dangerous Type in Rocklobster Contact Form 7 | 22 Apr 202105:17 | β | githubexploit |
![]() | Exploit for Unrestricted Upload of File with Dangerous Type in Rocklobster Contact Form 7 | 24 Dec 202009:10 | β | githubexploit |
![]() | CVE-2020-35489 | 17 Dec 202019:15 | β | osv |
![]() | Unrestricted file upload | 17 Dec 202019:15 | β | prion |
![]() | CVE-2020-35489 | 17 Dec 202018:16 | β | cvelist |
![]() | 5M WordPress Sites Running 'Contact Form 7' Plugin Open to Attack | 17 Dec 202022:27 | β | threatpost |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo