Unrated severityNVD Advisory· Published Jul 22, 2025· Updated Apr 8, 2026
Website Contact Form With File Upload <= 1.3.4 - Arbitrary File Upload
CVE-2015-10137
Description
The Website Contact Form With File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_file()' function in versions up to, and including, 1.3.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Affected products
2- Range: <=1.3.4
- N-Media/Website Contact Form With File Uploadv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- packetstormsecurity.com/files/131413/mitre
- packetstormsecurity.com/files/131514/mitre
- plugins.trac.wordpress.org/browser/website-contact-form-with-file-upload/trunk/readme.txtmitre
- plugins.trac.wordpress.org/browser/website-contact-form-with-file-upload/trunk/readme.txtmitre
- www.acunetix.com/vulnerabilities/web/wordpress-plugin-n-media-website-contact-form-with-file-upload-arbitrary-file-upload-1-3-4/mitre
- www.homelab.it/index.php/2015/04/12/wordpress-n-media-website-contact-form-shell-upload/mitre
- www.wordfence.com/threat-intel/vulnerabilities/id/8395e0c4-3feb-4551-9f2f-7b80cd187ecamitre
News mentions
0No linked articles in our index yet.