Impact
The vulnerability allows an attacker to send a crafted file path via the upload-1[file][file_path] parameter. When a form has the Save and Continue feature enabled and email notifications are set to attach uploaded files, the plugin can expose the contents of any file that the web server process can read. This results in unauthorized disclosure of sensitive data without granting code execution or modifying system integrity.
Affected Systems
WordPress sites running Forminator Forms plugin version 1.52.1 or earlier are affected. Any site with a publicly reachable form that includes a File Upload field, has the Save and Continue option enabled, and the email notification configured to attach uploaded files is vulnerable.
Risk and Exploitability
The CVSS score of 7.5 indicates a high confidentiality risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is straightforward and requires no authentication, making it likely that an exposed site can be exploited by anyone who can submit a form.
OpenCVE Enrichment