Description
Unrestricted Upload of File with Dangerous Type vulnerability in borisolhor Drop Uploader for CF7 - Drag&Drop File Uploader Addon drop-uploader-for-contact-form-7-dragdrop-file-uploader-addon allows Upload a Web Shell to a Web Server.This issue affects Drop Uploader for CF7 - Drag&Drop File Uploader Addon: from n/a through <= 2.4.1.
Published: 2025-11-06
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows an attacker to upload a file of any type to the web server, specifically a web shell that can subsequently be executed to gain control over the server. This results in a complete loss of confidentiality, integrity, and availability for the affected system, enabling the attacker to modify, delete, or exfiltrate data, inject further malware, or perform other malicious actions. The weakness is a classic uncontrolled file upload scenario (CWE-434).

Affected Systems

The flaw exists in the borisolhor Drop Uploader for CF7 – Drag & Drop File Uploader Addon plugin for WordPress, affecting all releases up to and including version 2.4.1. Any WordPress installation that has this plugin installed and configured to accept file uploads is impacted.

Risk and Exploitability

The CVSS score of 10 indicates the highest severity, meaning the potential impact is catastrophic. The EPSS score of less than 1% suggests that, at the time of this analysis, the probability of exploitation in the wild is low, but the existence of a known web shell upload still warrants urgent attention. The vulnerability is not listed in CISA's KEV catalog, so there is no known large‑scale exploitation campaign linked to it yet. Attackers most likely would target the plugin’s upload endpoint remotely, potentially requiring a user account with sufficient permissions to submit files through the contact form process.

Generated by OpenCVE AI on April 29, 2026 at 16:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of Drop Uploader for CF7. If no newer release is available, disable or delete the plugin entirely to remove the upload capability.
  • If the plugin must remain active for operational reasons, configure WordPress or the plugin to allow only strictly safe file types (e.g., images or documents) and block execution of scripts or executables at the server level.
  • Remove any files already uploaded through the vulnerable endpoint and conduct a security scan for malware or backdoors to ensure the system is not compromised.

Generated by OpenCVE AI on April 29, 2026 at 16:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Borisolhor
Borisolhor drop Uploader For Cf7
Wordpress
Wordpress wordpress
Vendors & Products Borisolhor
Borisolhor drop Uploader For Cf7
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in borisolhor Drop Uploader for CF7 - Drag&Drop File Uploader Addon drop-uploader-for-contact-form-7-dragdrop-file-uploader-addon allows Upload a Web Shell to a Web Server.This issue affects Drop Uploader for CF7 - Drag&Drop File Uploader Addon: from n/a through <= 2.4.1.
Title WordPress Drop Uploader for CF7 - Drag&Drop File Uploader Addon Plugin <= 2.4.1 - Arbitrary File Upload Vulnerability
Weaknesses CWE-434
References

Subscriptions

Borisolhor Drop Uploader For Cf7
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:12:29.681Z

Reserved: 2025-06-27T11:58:53.298Z

Link: CVE-2025-53283

cve-icon Vulnrichment

Updated: 2025-11-07T14:55:53.165Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:15:56.180

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-53283

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:30:15Z

Weaknesses