CVE-2026-32523
Published: 25 March 2026
Summary
CVE-2026-32523 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces validation of uploaded files to block dangerous types, preventing exploitation of the unrestricted file upload vulnerability in WPJAM Basic.
Requires timely identification, reporting, and patching of the specific flaw in WPJAM Basic versions through 6.9.2, eliminating the vulnerability.
Scans uploaded files for malicious code at entry points, mitigating server compromise from dangerous files allowed by the CVE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload of dangerous types (CWE-434) in public-facing WordPress plugin directly enables exploitation for initial access (T1190), ingress/transfer of malicious files such as PHP payloads (T1105), and deployment of web shells for execution/persistence (T1505.003).
NVD Description
Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM Basic wpjam-basic allows Using Malicious Files.This issue affects WPJAM Basic: from n/a through <= 6.9.2.
Deeper analysisAI
CVE-2026-32523 is an Unrestricted Upload of File with Dangerous Type vulnerability (CWE-434) in the WPJAM Basic WordPress plugin (wpjam-basic by denishua). It allows the use of malicious files and affects all versions from n/a through 6.9.2. Published on 2026-03-25, the vulnerability carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), marking it as critical.
The vulnerability can be exploited by an attacker with low privileges, such as an authenticated WordPress user, over the network with low attack complexity and no user interaction. Exploitation enables high-impact effects on confidentiality, integrity, and availability with a changed scope, allowing arbitrary file uploads that could lead to server compromise.
The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/wpjam-basic/vulnerability/wordpress-wpjam-basic-plugin-6-9-2-arbitrary-file-upload-vulnerability?_s_id=cve) details this arbitrary file upload issue in WPJAM Basic 6.9.2. Security practitioners should review this reference for mitigation guidance.
Details
- CWE(s)