VYPR
Critical severity9.8NVD Advisory· Published May 19, 2026· Updated May 19, 2026

CVE-2026-4885

CVE-2026-4885

Description

The Piotnet Addons for Elementor Pro plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the 'pafe_ajax_form_builder' function in all versions up to, and including, 7.1.70. The plugin uses an incomplete extension blacklist that only blocks php, phpt, php5, php7, and exe extensions, while allowing dangerous extensions such as .phar or .phtml to be uploaded. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The exploit can only be exploited if a file field is added to the form.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated arbitrary file upload in Piotnet Addons for Elementor Pro ≤7.1.70 due to incomplete extension blacklist, leading to RCE.

Vulnerability

Overview The Piotnet Addons for Elementor Pro plugin for WordPress is vulnerable to arbitrary file upload in versions up to and including 7.1.70. The vulnerability resides in the pafe_ajax_form_builder function, which fails to properly validate uploaded file types. The plugin relies on an incomplete extension blacklist that only blocks php, phpt, php5, php7, and exe extensions, while allowing dangerous extensions such as .phar or .phtml to be uploaded [1]. This oversight enables attackers to bypass the intended security restrictions.

Exploitation

Conditions To exploit this vulnerability, an attacker must ensure the affected Elementor form includes a file upload field. No authentication is required, making the attack surface accessible to any unauthenticated visitor of a site using the plugin. The attacker can craft a malicious file with an allowed but dangerous extension (e.g., .phar) and upload it through the form.

Impact

Successful exploitation allows an attacker to upload arbitrary files to the server. If the uploaded file is executed, this can lead to remote code execution (RCE) on the affected site's server, potentially giving the attacker full control over the WordPress installation and underlying system.

Mitigation

The vendor has not released a patch as of the publication date. The vulnerability is present in all versions up to 7.1.70. Users are advised to either disable the form file upload functionality or remove the file field from forms until a security update is available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.