id: CVE-2020-35489 info: name: WordPress Contact Form 7 - Unrestricted File Upload author: soyelmago severity: critical description: WordPress Contact Form 7 before 5.3.2 allows unrestricted file upload and remote code execution because a filename may contain special characters. remediation: | Update to the latest version of the Contact Form 7 plugin to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-35489 - https://web.archive.org/web/20210125141546/https://www.getastra.com/blog/911/plugin-exploit/contact-form-7-unrestricted-file-upload-vulnerability/ - https://wordpress.org/plugins/contact-form-7/#developers - https://www.jinsonvarghese.com/unrestricted-file-upload-in-contact-form-7/ - https://contactform7.com/2020/12/17/contact-form-7-532/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cve-id: CVE-2020-35489 cwe-id: CWE-434 epss-score: 0.91898 epss-percentile: 0.98658 cpe: cpe:2.3:a:rocklobster:contact_form_7:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: rocklobster product: contact_form_7 framework: wordpress tags: cve,cve2020,wordpress,wp-plugin,rce http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" matchers-condition: and matchers: - type: dsl dsl: - compare_versions(version, '< 5.3.2') - type: word part: body words: - "Contact Form 7" - '== Changelog ==' condition: and - type: status status: - 200 extractors: - type: regex name: version group: 1 regex: - "(?m)Stable tag: ([0-9.]+)" internal: true - type: regex group: 1 regex: - "(?m)Stable tag: ([0-9.]+)" # digest: 490a00463044022100d3c70ef8184e4e38dea1ebcae32a3da14882482b57c49bfe057760ae562d417f021f44a3ef0f62e3b24ec2073fad035257bdc6efddc1c8ce868906f3c1d8422ee9:922c64590222798bb761d5b6d8e72950