CVE-2020-12800

The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution...

Basic Information

CVE State
PUBLISHED
Reserved Date
May 12, 2020
Published Date
June 08, 2020
Last Updated
August 04, 2024
Vendor
n/a
Product
n/a
Description
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
Tags
wordpress php nuclei_scanner metasploit_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Score

Score
93.20% (Percentile: 99.79%) as of 2025-06-08

Exploit Status

Exploited in the Wild
Yes (2025-05-11 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-11 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

wp_dnd_mul_file_rce

Type: metasploit • Created: Unknown

Metasploit module for CVE-2020-12800

amartinsec/CVE-2020-12800

Type: github • Created: 2020-05-15 01:50:36 UTC • Stars: 27

POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Detected by Metasploit

  • Added to KEVIntel