PT-2026-41884 · WordPress · Piotnet Forms

Jude Nwadinobi

·

Published

2026-05-19

·

Updated

2026-05-19

·

CVE-2026-4883

CVSS v3.1

9.8

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Piotnet Forms versions prior to 2.1.41
Description An arbitrary file upload issue exists due to missing file type validation within the piotnetforms ajax form builder() function. The software employs an incomplete extension blacklist that blocks only php, phpt, php5, php7, and exe extensions, while permitting dangerous extensions such as .phar or .phtml. This allows unauthenticated attackers to upload arbitrary files to the server, potentially leading to remote code execution. This issue is only exploitable if a file field has been added to the form.
Recommendations Update to a version later than 2.1.40. As a temporary workaround, avoid adding file fields to forms until the update is applied.

Fix

RCE

Unrestricted File Upload

Weakness Enumeration

Related Identifiers

CVE-2026-4883

Affected Products

Piotnet Forms