Service Notices

All Notices > Security Notices > Remote Code Execution Vulnerability Caused by the WordPress Plug-in (Drag and Drop File Upload Contact Form Earlier than 1.3.3.3)

Remote Code Execution Vulnerability Caused by the WordPress Plug-in (Drag and Drop File Upload Contact Form Earlier than 1.3.3.3)

May 29, 2020 GMT+08:00

I. Overview

A researcher has recently released the remote code execution (RCE) vulnerability POC of WordPress. Using the Contact Form 7 plug-in with the Drag and Drop File Upload Contact Form plug-in (affected versions) will cause the RCE vulnerability.

If you are a WordPress user, check your plug-in versions and implement timely security hardening.

For more information about this vulnerability, visit the following website:

https://wordpress.org/plugins/drag-and-drop-multiple-file-upload-contact-form-7/#developers

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected Versions:

This vulnerability affects users who have installed WordPress and enabled the Contact Form 7 plug-in and Drag and Drop File Upload Contact Form plug-in (1.3.3.2 or earlier).

IV. Vulnerability Handling

Fixed versions of the plug-in have been officially released. If your plug-in falls in the affected range, upgrade it to a secure version (1.3.3 or later).

Download the latest version from the following link: https://downloads.wordpress.org/plugin/drag-and-drop-multiple-file-upload-contact-form-7.zip.

The Web Application Firewall (WAF) service, provided by HUAWEI CLOUD, supports PHP file upload detection. If you are also a WAF user, enable Webshell detection in Basic Web Protection, set the mode to Block, and the protection level to High.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.

 


We use cookies to improve our site and your experience. By continuing to browse our site you accept our cookie policy. Find out more