PT-2026-41884 · WordPress · Piotnet Forms
Jude Nwadinobi
·
Published
2026-05-19
·
Updated
2026-05-19
·
CVE-2026-4883
CVSS v3.1
9.8
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Piotnet Forms versions prior to 2.1.41
Description
An arbitrary file upload issue exists due to missing file type validation within the
piotnetforms ajax form builder() function. The software employs an incomplete extension blacklist that blocks only php, phpt, php5, php7, and exe extensions, while permitting dangerous extensions such as .phar or .phtml. This allows unauthenticated attackers to upload arbitrary files to the server, potentially leading to remote code execution. This issue is only exploitable if a file field has been added to the form.Recommendations
Update to a version later than 2.1.40.
As a temporary workaround, avoid adding file fields to forms until the update is applied.
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Piotnet Forms