VYPR
Medium severity6.8NVD Advisory· Published Mar 25, 2026· Updated Apr 29, 2026

CVE-2026-32496

CVE-2026-32496

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NYSL Spam Protect for Contact Form 7 wp-contact-form-7-spam-blocker allows Path Traversal.This issue affects Spam Protect for Contact Form 7: from n/a through <= 1.2.9.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in the WordPress Spam Protect for Contact Form 7 plugin allows unauthenticated attackers to delete arbitrary files, potentially breaking the site.

Vulnerability

Overview

The Spam Protect for Contact Form 7 plugin for WordPress (versions up to and including 1.2.9) contains an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [1]. This flaw allows an attacker to traverse outside the intended directory and delete arbitrary files on the server. The root cause is insufficient validation of user-supplied file paths before performing file deletion operations.

Exploitation

Attackers can exploit this vulnerability without authentication, making it accessible to anyone who can send crafted requests to the vulnerable plugin [1]. The attack vector is network-based, and no special privileges are required. The vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns targeting thousands of websites regardless of their size or popularity [1].

Impact

Successful exploitation could allow a malicious actor to delete arbitrary files from the affected WordPress site [1]. If core WordPress files are deleted, the site may break and stop functioning entirely. This could lead to a complete denial of service for the website.

Mitigation

The vulnerability has been patched in version 1.2.10 of the plugin [1]. Users are strongly advised to update immediately. For those unable to update, Patchstack has issued a mitigation rule to block attacks until the update is applied [1]. Hosting providers or web developers can assist with the update process.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.