{"api_version":"1","generated_at":"2026-04-11T05:02:17+00:00","cve":"CVE-2023-1112","urls":{"html":"https://cve.report/CVE-2023-1112","api":"https://cve.report/api/cve/CVE-2023-1112.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1112","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1112"},"summary":{"title":"CVE-2023-1112","description":"A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1 on WordPress. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-03-01 10:15:00","updated_at":"2023-11-07 04:02:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://vuldb.com/?ctiid.222072","name":"https://vuldb.com/?ctiid.222072","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://vuldb.com/?id.222072","name":"https://vuldb.com/?id.222072","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal","name":"https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal","refsource":"MISC","tags":[],"title":"GitHub - Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal: Drag and Drop Multiple File Uploader PRO - Contact Form 7 v5.0.6.1 Path Traversal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1112","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1112","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1112","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"codedropz","cpe5":"drag_and_drop_multiple_file_upload_-_contact_form_7","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1112","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"drag_and_drop_multiple_file_uploader_pro_-_contact_form_7_project","cpe5":"drag_and_drop_multiple_file_uploader_pro_-_contact_form_7","cpe6":"5.0.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1112","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1 on WordPress. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072."},{"lang":"deu","value":"Es wurde eine kritische Schwachstelle in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1 für WordPress ausgemacht. Es geht dabei um eine nicht klar definierte Funktion der Datei admin-ajax.php. Durch Manipulation des Arguments upload_name mit unbekannten Daten kann eine relative path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-23 Relative Path Traversal","cweId":"CWE-23"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Drag and Drop Multiple File Upload Contact Form 7","version":{"version_data":[{"version_affected":"=","version_value":"5.0.6.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.222072","refsource":"MISC","name":"https://vuldb.com/?id.222072"},{"url":"https://vuldb.com/?ctiid.222072","refsource":"MISC","name":"https://vuldb.com/?ctiid.222072"},{"url":"https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal","refsource":"MISC","name":"https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal"}]},"credits":[{"lang":"en","value":"Nicholas Ferreira"},{"lang":"en","value":"Nickguitar (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}]}},"nvd":{"publishedDate":"2023-03-01 10:15:00","lastModifiedDate":"2023-11-07 04:02:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:pro:wordpress:*:*","versionEndExcluding":"5.0.6.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}