The Multi Step Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the import functionality in all versions up to, and including, 1.7.25. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Sat, 06 Sep 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Multi Step Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the import functionality in all versions up to, and including, 1.7.25. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
Title | Multi Step Form <= 1.7.25 - Authenticated (Admin+) Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-09-06T02:24:17.551Z
Reserved: 2025-08-26T21:28:38.847Z
Link: CVE-2025-9515

No data.

Status : Received
Published: 2025-09-06T03:15:41.793
Modified: 2025-09-06T03:15:41.793
Link: CVE-2025-9515

No data.

No data.