Skip to main content
Mallory

Critical WordPress Form Plugin Flaws Enable Unauthenticated Server Compromise

internet-facing-service-vulnerabilitywidely-deployed-product-advisory
Updated April 8, 2026 at 10:03 PM3 sources
Share:
Critical WordPress Form Plugin Flaws Enable Unauthenticated Server Compromise

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Two high-severity vulnerabilities were disclosed in widely used WordPress form plugins, exposing sites to unauthenticated attacks that can lead to full server compromise. CVE-2026-4347 affects MW WP Form through version 5.1.0 and stems from insufficient file path validation in generate_user_filepath and move_temp_file_to_upload_dir. An attacker can move arbitrary files on the server without authentication, and if a sensitive file such as wp-config.php is relocated, the flaw can be leveraged for remote code execution. Exploitation requires a form with a file upload field and the Saving inquiry data in database option enabled; the issue is tracked as CWE-22.

Timeline

  1. Apr 8, 2026

    Everest Forms PHP object injection disclosed as CVE-2026-3296

    The Everest Forms vulnerability was newly received by security@wordfence.com as CVE-2026-3296. The flaw enables unauthenticated PHP object injection through public form fields due to unsafe use of unserialize(), potentially causing severe impact when an administrator opens stored entries.

  2. Apr 8, 2026

    Everest Forms fixes PHP object injection in version 3.4.4

    References associated with CVE-2026-3296 indicate code changes tied to the Everest Forms 3.4.4 update, addressing unsafe deserialization of untrusted form entry metadata. The issue affects versions up to and including 3.4.3 and can be triggered by unauthenticated form submissions, with exploitation occurring when an administrator views entries.

  3. Apr 2, 2026

    MW WP Form arbitrary file move vulnerability disclosed as CVE-2026-4347

    A vulnerability affecting MW WP Form versions up to and including 5.1.0 was newly received by security@wordfence.com. The flaw allows unauthenticated attackers to move arbitrary files via insufficient file path validation, potentially leading to remote code execution under specific configuration conditions.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Organizations

Affected Products

Related Stories

Critical WordPress Plugin Flaws Expose Sites to RCE and Privilege Escalation

Critical WordPress Plugin Flaws Expose Sites to RCE and Privilege Escalation

Two high-severity vulnerabilities have been disclosed in widely deployed WordPress plugins, exposing internet-facing sites to **unauthenticated compromise**. `CVE-2026-3584` affects **Kali Forms** through version `2.4.9` and allows **remote code execution** because user-controlled input can be mapped into internal placeholder storage and later invoked via `call_user_func` in the `form_process` path. The issue is classified as `CWE-94` and carries a `CVSS 3.1` score with the vector `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`, indicating critical impact on confidentiality, integrity, and availability. A second flaw, `CVE-2026-4038`, affects **Aimogen Pro** through version `2.7.5` and enables **unauthenticated privilege escalation** through an arbitrary function call in `aiomatic_call_ai_function_realtime` caused by a missing capability check. According to the disclosure, attackers can invoke WordPress functions such as `update_option` to change the default registration role to administrator and enable user registration, effectively creating a path to full site takeover. The vulnerability is tracked as `CWE-862` and was likewise rated with a high-impact `CVSS 3.1` vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`.

1 months ago
Critical File Upload Flaws Expose WordPress Plugins to Remote Code Execution

Critical File Upload Flaws Expose WordPress Plugins to Remote Code Execution

Multiple WordPress plugins were found vulnerable to **unauthenticated arbitrary file upload** flaws that can lead to remote code execution and full site compromise. The most urgent case involves the **Breeze Cache** plugin, where **CVE-2026-3844** affects versions through `2.4.4` when the optional **"Host Files Locally - Gravatars"** feature is enabled. Researchers said the bug stems from missing file-type validation in the `fetch_gravatar_from_remote` function, and BleepingComputer reported that attackers are already exploiting the issue in the wild, with Wordfence observing more than 170 attack attempts. Cloudways released a fix in version `2.4.5`, and defenders were urged to update immediately or disable the Gravatar-related feature until patching is complete. Two additional **Contact Form 7** upload extensions were also disclosed with critical upload weaknesses. **CVE-2026-5718** affects **Drag and Drop Multiple File Upload for Contact Form 7** through `1.3.9.6`, where custom blacklist handling can override the default dangerous-extension denylist and a non-ASCII filename trick can bypass sanitization, allowing attackers to upload PHP files. **CVE-2026-5364** affects **Drag and Drop File Upload for Contact Form 7** through `1.1.3`, where the plugin validates an unsanitized extension but saves a sanitized one, enabling bypasses using special characters such as `$`; researchers noted that `.htaccess` protections and filename randomization may reduce real-world exploitability. Together, the disclosures highlight a broader pattern of insecure file validation in WordPress upload plugins.

1 weeks ago
Unauthenticated Privilege Escalation in WordPress *Advanced Custom Fields: Extended* (CVE-2025-14533)

Unauthenticated Privilege Escalation in WordPress *Advanced Custom Fields: Extended* (CVE-2025-14533)

A critical vulnerability, **CVE-2025-14533**, was disclosed in the WordPress plugin *Advanced Custom Fields: Extended* affecting versions **<= 0.9.2.1**. The issue is an **unauthenticated privilege escalation** in the plugin’s user-form handling, where the `insert_user` logic does not properly restrict which roles can be assigned during registration; as a result, an attacker can submit a registration request specifying the **`administrator`** role and obtain full administrative access under certain configurations. Reporting indicates exploitation depends on site configuration: the flaw is reachable when a form is set up such that the **`role`** value is mapped to a custom field / user role field is present in the form. The weakness was identified by **Andrea Bocchetti** via the **Wordfence Bug Bounty Program**, and is associated with **CWE-269 (Improper Privilege Management)**; once admin access is obtained, attackers can fully compromise the site (e.g., upload malicious plugins/themes, plant backdoors, or alter content for redirects).

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Critical WordPress Form Plugin Flaws Enable Unauthenticated Server Compromise | Mallory