{"api_version":"1","generated_at":"2026-04-11T05:00:16+00:00","cve":"CVE-2022-3282","urls":{"html":"https://cve.report/CVE-2022-3282","api":"https://cve.report/api/cve/CVE-2022-3282.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3282","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3282"},"summary":{"title":"CVE-2022-3282","description":"The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.5 does not properly check for the upload size limit set in forms, taking the value from user input sent when submitting the form. As a result, attackers could control the file length limit and bypass the limit set by admins in the contact form.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-10-17 12:15:00","updated_at":"2022-10-20 19:05:00"},"problem_types":["CWE-639"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c","name":"https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c","refsource":"MISC","tags":[],"title":"Drag and Drop Multiple File Upload < 1.3.6.5 - File Upload Size Limit Bypass WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3282","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3282","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Sanjay Das","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"3282","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"codedropz","cpe5":"drag_and_drop_multiple_file_upload_-_contact_form_7","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-3282","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Drag and Drop Multiple File Upload < 1.3.6.5 - File Upload Size Limit Bypass"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Drag and Drop Multiple File Upload – Contact Form 7","version":{"version_data":[{"version_affected":"<","version_name":"1.3.6.5","version_value":"1.3.6.5"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.5 does not properly check for the upload size limit set in forms, taking the value from user input sent when submitting the form. As a result, attackers could control the file length limit and bypass the limit set by admins in the contact form."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c","name":"https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-639 Authorization Bypass Through User-Controlled Key","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Sanjay Das"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-10-17 12:15:00","lastModifiedDate":"2022-10-20 19:05:00","problem_types":["CWE-639"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.3.6.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}