First published: Wed Mar 23 2022(Updated: )
The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/includes/ajax/controllers/uploads.php file which can be bypassed making it possible for unauthenticated attackers to upload malicious files that can be used to obtain remote code execution, in versions up to and including 3.3.0
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ninja Forms | <=3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-0888.
The severity of CVE-2022-0888 vulnerability is critical with a score of 9.8.
The vulnerability in the plugin allows unauthenticated attackers to bypass input file type validation and upload malicious files.
The vulnerability affects version up to and including 3.3.0 of the Ninja Forms - File Uploads Extension WordPress plugin.
To fix the vulnerability, update the Ninja Forms - File Uploads Extension WordPress plugin to a version later than 3.3.0.