Cyber Posture

CVE-2024-12267

Medium

Published: 31 January 2025

Published
31 January 2025
Modified
11 August 2025
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0010 26.4th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-12267 is a medium-severity External Control of File Name or Path (CWE-73) vulnerability in Codedropz Drag And Drop Multiple File Upload - Contact Form 7. Its CVSS base score is 5.3 (Medium).

Operationally, ranked at the 26.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-14 (Public Access Protections) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly counters the insufficient file path validation in the dnd_codedropz_upload_delete() function by requiring input validation mechanisms at system entry points.

prevent

Ensures timely remediation of the specific flaw through identification, testing, and patching as provided in the plugin's Trac changeset 3231973.

prevent

Protects against unauthorized file deletion via public interfaces exploited by unauthenticated remote attackers in this vulnerability.

NVD Description

The Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress is vulnerable to limited arbitrary file deletion due to insufficient file path validation in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.8.5. This…

more

makes it possible for unauthenticated attackers to delete limited arbitrary files on the server. It is not possible to delete files like wp-config.php that would make RCE possible.

Deeper analysisAI

CVE-2024-12267 affects the Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress, impacting all versions up to and including 1.3.8.5. The vulnerability stems from insufficient file path validation in the dnd_codedropz_upload_delete() function, enabling limited arbitrary file deletion. It carries a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) and is associated with CWE-73 (External Control of File Name or Path).

Unauthenticated attackers can exploit this issue remotely with low complexity and no privileges required. Successful exploitation allows deletion of limited arbitrary files on the server, though critical files such as wp-config.php cannot be targeted, preventing escalation to remote code execution.

Advisories reference a patch in the plugin's Trac changeset 3231973, which updates the dnd-upload-cf7.php file to address the validation flaw. Wordfence threat intelligence provides further details on the vulnerability at their dedicated page.

Details

CWE(s)

Affected Products

codedropz
drag and drop multiple file upload - contact form 7
≤ 1.3.8.6

CVEs Like This One

CVE-2025-2328Same product: Codedropz Drag And Drop Multiple File Upload - Contact Form 7
CVE-2025-2485Same product: Codedropz Drag And Drop Multiple File Upload - Contact Form 7
CVE-2025-14457Same product class: WordPress / CMS plugin
CVE-2024-13359Same product class: WordPress / CMS plugin
CVE-2024-12129Same product class: WordPress / CMS plugin
CVE-2024-8425Same product class: WordPress / CMS plugin
CVE-2024-13641Same product class: WordPress / CMS plugin
CVE-2025-28864Same product class: WordPress / CMS plugin
CVE-2024-13622Same product class: WordPress / CMS plugin
CVE-2025-1912Same product class: WordPress / CMS plugin

References