{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T17:48:52.235","vulnerabilities":[{"cve":{"id":"CVE-2024-12267","sourceIdentifier":"security@wordfence.com","published":"2025-01-31T11:15:09.473","lastModified":"2025-08-11T14:20:55.887","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress is vulnerable to limited arbitrary file deletion due to insufficient file path validation in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.8.5. This makes it possible for unauthenticated attackers to delete limited arbitrary files on the server. It is not possible to delete files like wp-config.php that would make RCE possible."},{"lang":"es","value":"El complemento Drag and Drop Multiple File Upload – Contact Form 7 de WordPress es vulnerable a la eliminación arbitraria limitada de archivos debido a una validación insuficiente de la ruta de archivo en la función dnd_codedropz_upload_delete() en todas las versiones hasta la 1.3.8.5 y incluida. Esto permite que atacantes no autenticados eliminen una cantidad limitada de archivos arbitrarios en el servidor. No es posible eliminar archivos como wp-config.php que harían posible la eliminación arbitraria de archivos."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-73"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.3.8.6","matchCriteriaId":"350F994A-5C29-493A-A316-6D80E297F90D"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/changeset/3231973/drag-and-drop-multiple-file-upload-contact-form-7/trunk/inc/dnd-upload-cf7.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/00ec7251-3be1-411a-b38e-1782d1691e18?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}