<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-5364 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5364/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5364/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-plugin-upload/</guid><description>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.</description><content:encoded><![CDATA[<p>The Drag and Drop File Upload for Contact Form 7 plugin for WordPress, in versions up to and including 1.1.3, contains an arbitrary file upload vulnerability tracked as CVE-2026-5364. The flaw stems from insufficient sanitization of file extensions during the upload process. Specifically, the plugin extracts the file extension before sanitization and allows the file type parameter to be controlled by the attacker. Furthermore, validation occurs on the unsanitized extension, while the file is saved with a sanitized extension, stripping special characters like &lsquo;$&rsquo; during the save. While an .htaccess file and name randomization are present, these restrictions may be bypassable in certain configurations or by exploiting other vulnerabilities. This vulnerability could allow unauthenticated attackers to upload arbitrary PHP files to the web server, potentially leading to remote code execution (RCE).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using a vulnerable version (&lt;= 1.1.3) of the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the plugin&rsquo;s upload endpoint, typically <code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>.</li>
<li>The POST request includes a file with a manipulated extension, such as <code>evil.php$.jpg</code>, where <code>evil.php</code> is the malicious PHP payload and <code>$.jpg</code> is designed to be sanitized to <code>.jpg</code>.</li>
<li>The attacker modifies the <code>file type</code> parameter in the request to reflect the original manipulated file extension (<code>evil.php$.jpg</code>).</li>
<li>The plugin validates the extension against administrator-configured types but, due to the unsanitized extension and attacker control over the file type parameter, the malicious file passes validation.</li>
<li>The plugin sanitizes the extension, removing the <code>$</code> character, resulting in a file saved with the extension <code>.php</code>.</li>
<li>The attacker attempts to access the uploaded PHP file via a direct HTTP request to <code>/wp-content/uploads/&lt;random_name&gt;.php</code>.</li>
<li>If the <code>.htaccess</code> restrictions are bypassed (e.g., due to misconfiguration or another vulnerability), the web server executes the malicious PHP code, granting the attacker remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5364 allows unauthenticated attackers to upload and execute arbitrary PHP code on the target WordPress server. This can lead to complete compromise of the website, including defacement, data theft, and installation of backdoors. While the presence of <code>.htaccess</code> and name randomization mitigates the risk, these protections may be bypassed, especially when combined with other vulnerabilities or misconfigurations. Given the widespread use of WordPress and its plugins, this vulnerability poses a significant risk to a large number of websites. The CVSS v3.1 base score is 8.1, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;Drag and Drop File Upload for Contact Form 7&rdquo; plugin to the latest version (greater than 1.1.3) to patch CVE-2026-5364.</li>
<li>Implement a Web Application Firewall (WAF) rule to inspect and block requests containing suspicious file extensions in the POST parameters targeting the plugin&rsquo;s upload endpoint (<code>/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/upload.php</code>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious File Upload via Drag and Drop CF7</code> to identify exploitation attempts in web server logs (cs-uri-query).</li>
<li>Review and harden <code>.htaccess</code> configurations to ensure that PHP execution is restricted in the <code>/wp-content/uploads/</code> directory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category><category>plugin</category><category>CVE-2026-5364</category></item></channel></rss>