Description
The Piotnet Forms plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the 'piotnetforms_ajax_form_builder' function in all versions up to, and including, 2.1.40. The plugin uses an incomplete extension blacklist that only blocks php, phpt, php5, php7, and exe extensions, while allowing dangerous extensions such as .phar or .phtml to be uploaded. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The exploit can only be exploited if a file field is added to the form.
Published: 2026-05-19
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Piotnet Forms plugin for WordPress allows unauthenticated users to upload files by bypassing the former file‑type validation in the piotnetforms_ajax_form_builder routine. Because the plugin only excludes php, phpt, php5, php7, and exe extensions, it accepts dangerous extensions such as .phar or .phtml and writes them to the server’s upload directory. An attacker can therefore place executable code on the site to obtain remote command execution capabilities. The description explicitly notes that this vulnerability is exploitable only when a form contains a file field, limiting the risk to sites that have enabled file uploads on any form. The flaw is an input validation weakness—CWE‑434—which permits untrusted content to be stored without proper filtering, enabling malicious payloads.

Affected Systems

The vulnerability affects the Piotnet Forms WordPress plugin for all users of the class Piotnet Forms, specifically versions up to and including 2.1.40. Any WordPress installation running the plugin and with at least one form configured to accept file uploads is susceptible. No other vendors or product versions are mentioned in the CNA list.

Risk and Exploitability

The base CVSS score of 9.8 reflects a high severity, indicating full remote code execution possible with minimal effort and no authentication. EPSS data is not available, so the current likelihood of exploitation is unknown, but the severe impact justifies close attention. The vulnerability is not listed in CISA’s KEV catalog. Attackers can exploit the flaw by sending a crafted HTTP request that includes a file field, naming a file with a dangerous extension such as .phar, and causing the plugin to store it on the web server. Once stored, an attacker may be able to execute the file through the web server or via other compromised credentials if the file is a PHP script or similar.

Generated by OpenCVE AI on May 19, 2026 at 13:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Piotnet Forms to the latest version that removes the insecure upload capability.
  • Remove or disable all file upload fields from forms until the plugin is upgraded.
  • Configure the web server or WordPress settings to block execution of files placed in the uploads directory (for example, by adding a deny rule for .php and similar extensions).

Generated by OpenCVE AI on May 19, 2026 at 13:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Piotnet
Piotnet piotnet Forms
Wordpress
Wordpress wordpress
Vendors & Products Piotnet
Piotnet piotnet Forms
Wordpress
Wordpress wordpress

Tue, 19 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description The Piotnet Forms plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the 'piotnetforms_ajax_form_builder' function in all versions up to, and including, 2.1.40. The plugin uses an incomplete extension blacklist that only blocks php, phpt, php5, php7, and exe extensions, while allowing dangerous extensions such as .phar or .phtml to be uploaded. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The exploit can only be exploited if a file field is added to the form.
Title Piotnet Forms <= 2.1.40 - Unauthenticated Arbitrary File Upload via Form File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Piotnet Piotnet Forms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-19T13:44:33.801Z

Reserved: 2026-03-26T08:46:53.428Z

Link: CVE-2026-4883

cve-icon Vulnrichment

Updated: 2026-05-19T13:44:30.335Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T13:16:19.340

Modified: 2026-05-19T14:38:39.660

Link: CVE-2026-4883

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T13:30:05Z

Weaknesses