The Metform Elementor Contact Form Builder for WordPress is vulnerable to Arbitrary File Upload due to insufficient file type validation in versions up to, and including, 3.2.4. This allows unauthenticated visitors to perform a "double extension" attack and upload files containing a malicious extension but ending with a benign extension, which may make remote code execution possible in some configurations.
References
Configurations
Configuration 1 (hide)
|
History
28 Feb 2025, 22:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/metform/trunk/core/entries/file-data-validation.php?rev=2746287 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/2896914/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/697ce433-f321-4977-a2ad-68369d9ce9c3?source=cve - Third Party Advisory | |
First Time |
Wpmet metform Elementor Contact Form Builder
Wpmet |
Information
Published : 2024-08-17 10:15
Updated : 2025-04-23 17:30
NVD link : CVE-2023-0714
Mitre link : CVE-2023-0714
CVE.ORG link : CVE-2023-0714
JSON object : View
Products Affected
wpmet
- metform_elementor_contact_form_builder
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type