PT-2026-26882 · Jetmonsters · Jetformbuilder — Dynamic Blocks Form Builder

Daroo

·

Published

2026-03-21

·

Updated

2026-03-21

·

CVE-2026-4373

CVSS v3.1

7.5

High

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded File::set from array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File Tools::is same file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with a Media Field and a Send Email action with file attachment.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-4373

Affected Products

Jetformbuilder — Dynamic Blocks Form Builder