← Back to CVEs
CVE-2022-0888
CRITICAL9.8
Description
The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/includes/ajax/controllers/uploads.php file which can be bypassed making it possible for unauthenticated attackers to upload malicious files that can be used to obtain remote code execution, in versions up to and including 3.3.0
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/23/2022
Last Modified4/8/2026
Sourcenvd
Honeypot Sightings0
Affected Products
ninjaforms:ninja_forms_file_uploads
Weaknesses (CWE)
CWE-434CWE-434
References
https://gist.github.com/Xib3rR4dAr/5f0accbbfdee279c68ed144da9cd8607(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/f00eeaef-f277-481f-9e18-bf1ced0015a0?source=cve(security@wordfence.com)
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0888(security@wordfence.com)
https://gist.github.com/Xib3rR4dAr/5f0accbbfdee279c68ed144da9cd8607(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/threat-intel/vulnerabilities/id/f00eeaef-f277-481f-9e18-bf1ced0015a0?source=cve(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0888(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.