Description
The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27.
Published: 2026-04-07
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Unauthenticated Arbitrary File Upload
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an attacker to upload any file to the server because the plugin does not validate the file type in the upload handler. By uploading a malicious script, an attacker can potentially execute code on the host, compromising confidentiality, integrity, and availability. The weakness is identified as CWE‑434, an unrestricted upload of a potentially dangerous file type.

Affected Systems

The issue affects the Ninja Forms – File Uploads WordPress extension supplied by SaturdayDrive. All releases up to and including version 3.3.26 are susceptible. Version 3.3.25 discloses a partial mitigation, while the full fix is available only from version 3.3.27 onward.

Risk and Exploitability

The CVSS score of 9.8 indicates a high‑severity vulnerability, and the lack of EPSS data does not diminish its danger. Because the upload endpoint is publicly accessible without authentication, the likelihood of exploitation is high. Attackers that successfully upload a malicious file can run arbitrary code on the server, potentially taking over the site.

Generated by OpenCVE AI on April 7, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Ninja Forms – File Uploads plugin to version 3.3.27 or later.

Generated by OpenCVE AI on April 7, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Saturdaydrive
Saturdaydrive ninja Forms - File Uploads
Wordpress
Wordpress wordpress
Vendors & Products Saturdaydrive
Saturdaydrive ninja Forms - File Uploads
Wordpress
Wordpress wordpress

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Description The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27.
Title Ninja Forms - File Upload <= 3.3.26 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Saturdaydrive Ninja Forms - File Uploads
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:34:50.670Z

Reserved: 2026-01-08T16:45:37.724Z

Link: CVE-2026-0740

cve-icon Vulnrichment

Updated: 2026-04-07T14:34:07.650Z

cve-icon NVD

Status : Deferred

Published: 2026-04-07T05:16:06.897

Modified: 2026-04-27T19:04:22.650

Link: CVE-2026-0740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:50:08Z

Weaknesses