UNKNOWN (0.0)
    Plugin

    Unauthorized File Deletion in Drag and Drop Multiple File Upload for Contact Form 7 Plugin

    Published Date: 1/15/2026
    CVE ID: CVE-2025-14457

    Summary

    The Drag and Drop Multiple File Upload for Contact Form 7 plugin up to version 1.3.9.2 is vulnerable to an unauthorized data modification issue. This vulnerability allows unauthenticated attackers to delete uploaded files due to a missing ownership check when the 'Send attachments as links' option is enabled.

    Vulnerability Details

    The Drag and Drop Multiple File Upload for Contact Form 7 plugin suffers from a vulnerability that lacks proper access control in the dnd_codedropz_upload_delete() function. This issue arises because the function does not verify the ownership of files, enabling unauthorized users to perform delete actions on any uploaded file. When the plugin setting 'Send attachments as links' is enabled, attackers can exploit this flaw to delete arbitrary files uploaded through the Contact Form 7 interface. This can result in loss of critical files or disruption of service. The weakness is particularly concerning for sites that heavily rely on file uploads for normal operations and have this setting enabled.

    Recommendations

    To mitigate this vulnerability, site administrators should disable the 'Send attachments as links' setting until a fix is applied. It is also recommended to enforce stringent access controls around file management functionalities and limit file upload permissions to authenticated and trusted users only.

    Available Fixes

    Last Updated: 1/16/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More