id: CVE-2020-35489 info: name: WordPress Contact Form 7 - Unrestricted File Upload author: soyelmago severity: critical description: WordPress Contact Form 7 before 5.3.2 allows unrestricted file upload and remote code execution because a filename may contain special characters. remediation: | Update to the latest version of the Contact Form 7 plugin to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-35489 - https://web.archive.org/web/20210125141546/https://www.getastra.com/blog/911/plugin-exploit/contact-form-7-unrestricted-file-upload-vulnerability/ - https://wordpress.org/plugins/contact-form-7/#developers - https://www.jinsonvarghese.com/unrestricted-file-upload-in-contact-form-7/ - https://contactform7.com/2020/12/17/contact-form-7-532/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cve-id: CVE-2020-35489 cwe-id: CWE-434 epss-score: 0.91898 epss-percentile: 0.98663 cpe: cpe:2.3:a:rocklobster:contact_form_7:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: rocklobster product: contact_form_7 framework: wordpress tags: cve,cve2020,wordpress,wp-plugin,rce http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt" matchers-condition: and matchers: - type: dsl dsl: - compare_versions(version, '< 5.3.2') - type: word part: body words: - "Contact Form 7" - '== Changelog ==' condition: and - type: status status: - 200 extractors: - type: regex name: version group: 1 regex: - "(?m)Stable tag: ([0-9.]+)" internal: true - type: regex group: 1 regex: - "(?m)Stable tag: ([0-9.]+)" # digest: 490a00463044022053c3078227cb96f71a3b389dac2b99ca5ac1c3b04b890b8ce748d5332d046f4902203c0bd797d2d04739513932893dbcb90813c225d04fd3bb0547ae24fbe5f7d899:922c64590222798bb761d5b6d8e72950