Hackers exploit critical flaw in Ninja Forms WordPress plugin
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住关键点。 文章讲的是Ninja Forms File Uploads插件的一个严重漏洞,CVE-2026-0740。这个漏洞允许未经认证的用户上传任意文件,甚至PHP脚本,从而导致远程代码执行。影响很大,已经有超过3600次攻击被拦截。 然后,Ninja Forms是一个流行的WordPress表单构建器,用户数量很多。漏洞评分很高,9.8分。问题出在文件类型和扩展名没有被验证,攻击者可以上传恶意文件并进行路径遍历。 发现者是Sélim Lanouar,在1月8日提交给了Wordfence。修复是在3月19日发布的3.3.27版本中。Wordfence每天检测到很多攻击尝试,所以建议用户尽快升级。 总结的时候要包含:漏洞名称、影响、攻击方式、评分、影响范围、修复情况以及建议。控制在100字以内的话,可能需要精简一些细节。 比如:“Ninja Forms File Uploads插件存在严重漏洞(CVE-2026-0740),允许未经认证的用户上传任意文件并执行远程代码。该漏洞影响版本3.3.26及以下,已导致数千次攻击。修复版本3.3.27已发布,建议用户立即升级以防范风险。” 这样应该符合要求了。 </think> Ninja Forms File Uploads插件存在严重漏洞(CVE-2026-0740),允许未经认证的用户上传任意文件并执行远程代码。该漏洞影响版本3.3.26及以下,已导致数千次攻击。修复版本3.3.27已发布,建议用户立即升级以防范风险。 2026-4-7 22:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:10 收藏

Hackers exploit critical flaw in Ninja Forms WordPress plugin

A critical vulnerability in the Ninja Forms File Uploads premium add-on for WordPress allows uploading arbitrary files without authentication, which can lead to remote code execution.

Identified as CVE-2026-0740, the issue is currently exploited in attacks. According to WordPress security company Defiant, its Wordfence firewall blocked more than 3,600 attacks over the past 24 hours.

With over 600,000 downloads, Ninja Forms is a popular WordPress form builder that lets users create forms without coding using a drag-and-drop interface. Its File Upload extension, included in the same suite, serves 90,000 customers.

Wiz

With a critical severity rating of 9.8 out of 10, the CVE-2026-0740 vulnerability affects Ninja Forms File Upload versions up to 3.3.26.

According to Wordfence researchers, the flaw is caused by a lack of validation of file types/extensions on the destination filename, allowing an unauthenticated attacker to upload arbitrary files, including PHP scripts, and also manipulate filenames to enable path traversal.

“The function does not include any file type or extension checks on the destination filename before the move operation in the vulnerable version,” Wordfence explains.

“This means that not only safe files can be uploaded, but it is also possible to upload files with a .php extension.”

“Since no filename sanitization is utilized, the malicious parameter also facilitates path traversal, allowing the file to be moved even to the webroot directory.”

“This makes it possible for unauthenticated attackers to upload arbitrary malicious PHP code and then access the file to trigger remote code execution on the server.”

The potential repercussions of exploitation are dire, including the deployment of web shells and complete site takeover.

Discovery and fixes

The vulnerability was discovered by security researcher Sélim Lanouar (whattheslime), who submitted it to Wordfence’s bug bounty program on January 8.

Following validation, Wordfence disclosed the full details to the vendor on the same day and pushed temporary mitigations via firewall rules to its customers.

After patch reviews and a partial fix on February 10, the vendor released a complete fix in version 3.3.27, available since March 19.

Given that Wordfence is detecting thousands of exploitation attempts daily, users of Ninja Forms File Upload are strongly recommended to prioritize upgrading to the latest version.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/
如有侵权请联系:admin#unsafe.sh