Lucene search

K
wpvulndbWpvulndbWPVDB-ID:53E47E67-C8C9-45A9-9A9C-DA52C37047BF
HistoryMay 26, 2020 - 12:00 a.m.

Drag and Drop Multiple File Upload for Contact Form 7 < 1.3.3.3 - Unauthenticated File Upload Bypass

2020-05-2600:00:00
wpscan.com
8

EPSS

0.975

Percentile

100.0%

Due to the plugin not properly checking the file being uploaded (via the dnd_codedropz_upload AJAX action), an attacker could bypass the checks in place and upload a PHP file. There was a working exploit provided along with this vulnerability. It also requires the Contact Form 7 plugin to be installed on the target machine.

PoC

https://github.com/amartinsec/CVE-2020-12800/blob/master/exploit.py