¿ì²¥ÊÓÆµ

Skip to main content Skip to local navigation

Ninja Forms WordPress Plugin Vulnerability (CVE-2026-0740)

 

A picture containing text  Description automatically generated

 

Information Security Advisory


A recently disclosed critical vulnerability in the Ninja Forms – File Uploads plugin for WordPress (CVE‑2026‑0740) allows unauthenticated remote attackers to upload arbitrary files, potentially leading to remote code execution and full site compromise.

Severity level:
CVSS Score: 9.8/Critical

Description
:
The Ninja Forms – File Uploads plugin for WordPress fails to properly validate uploaded file types in the NF_FU_AJAX_Controllers_Uploads::handle_upload function. In vulnerable versions, this flaw allows unauthenticated attackers to upload arbitrary files, including malicious PHP scripts. Due to insufficient filename sanitization, attackers may also leverage path traversal techniques to place files in sensitive directories, such as the web root. Successful exploitation can result in remote code execution, web shell deployment, and complete takeover of the affected WordPress site.

Affected Versions:

All versions up to and including 3.3.26.

Impact:
Successful exploitation may result in Remote code execution on the server.

Resolution:
Upgrade immediately to Ninja Forms – File Uploads plugin version 3.3.27 or later.

Reference:

 


Information Security
 

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: ¿ì²¥ÊÓÆµ, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web