{"id":45203,"date":"2026-04-08T06:27:58","date_gmt":"2026-04-07T22:27:58","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin\/"},"modified":"2026-04-08T06:27:58","modified_gmt":"2026-04-07T22:27:58","slug":"hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin\/","title":{"rendered":"Hackers exploit critical flaw in Ninja Forms WordPress plugin"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/07\/NinjaForms.jpg\" width=\"1600\" alt=\"Hackers exploit critical flaw in Ninja Forms WordPress plugin\"><\/p>\n<p>A critical vulnerability in the Ninja Forms File Uploads premium add-on for WordPress allows uploading arbitrary files without authentication, which can lead to remote code execution.<\/p>\n<p>Identified as CVE-2026-0740, the issue is currently exploited in attacks. According to WordPress security company Defiant, its Wordfence firewall blocked more than <a href=\"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/wordpress-plugins\/ninja-forms-uploads\/ninja-forms-file-upload-3326-unauthenticated-arbitrary-file-upload\" rel=\"nofollow noopener\">3,600 attacks<\/a> over the past 24 hours.<\/p>\n<p>With over <a href=\"https:\/\/wordpress.org\/plugins\/ninja-forms\/\" rel=\"nofollow noopener\">600,000&nbsp;downloads<\/a>, Ninja Forms is a popular WordPress form builder that lets users create forms without coding using a drag-and-drop interface. Its File Upload extension, included in the same suite, serves <a href=\"https:\/\/ninjaforms.com\/extensions\/file-uploads\/\" rel=\"nofollow noopener\">90,000&nbsp;customers<\/a>.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Hackers exploit critical flaw in Ninja Forms WordPress plugin\"><\/a> <\/div>\n<p>With a critical severity rating of 9.8 out of 10, the CVE-2026-0740 vulnerability affects Ninja Forms File Upload versions up to 3.3.26.<\/p>\n<p>According to Wordfence researchers, the flaw is caused by a lack of validation of file types\/extensions on the destination filename, allowing an unauthenticated attacker to upload arbitrary files, including PHP scripts, and also manipulate filenames to enable path traversal.<\/p>\n<p>&ldquo;The function does not include any file type or extension checks on the destination filename before the move operation in the vulnerable version,&rdquo; <a href=\"https:\/\/www.wordfence.com\/blog\/2026\/04\/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin\/\" rel=\"nofollow noopener\">Wordfence explains<\/a>.<\/p>\n<p>&ldquo;This means that not only safe files can be uploaded, but it is also possible to upload files with a .php extension.&rdquo;<\/p>\n<p>&ldquo;Since no filename sanitization is utilized, the malicious parameter also facilitates path traversal, allowing the file to be moved even to the webroot directory.&rdquo;<\/p>\n<p>&ldquo;This makes it possible for unauthenticated attackers to upload arbitrary malicious PHP code and then access the file to trigger remote code execution on the server.&rdquo;<\/p>\n<p>The potential repercussions of exploitation are dire, including the deployment of web shells and complete site takeover.<\/p>\n<h3>Discovery and fixes<\/h3>\n<p>The vulnerability was discovered by security researcher S&eacute;lim Lanouar (whattheslime), who submitted it to Wordfence&rsquo;s bug bounty program on January 8.<\/p>\n<p>Following validation, Wordfence disclosed the full details to the vendor on the same day and pushed temporary mitigations via firewall rules to its customers.<\/p>\n<p>After patch reviews and a partial fix on February 10, the vendor released a complete fix in version 3.3.27, available since March 19.<\/p>\n<p>Given that Wordfence is detecting thousands of exploitation attempts daily, users of Ninja Forms File Upload are strongly recommended to prioritize upgrading to the latest version.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Hackers exploit critical flaw in Ninja Forms WordPress plugin\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/wordpress-membership-plugin-bug-exploited-to-create-admin-accounts\/\">WordPress membership plugin bug exploited to create admin accounts<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/wordpress-plugin-with-900k-installs-vulnerable-to-critical-rce-flaw\/\">WordPress plugin with 900k installs vulnerable to critical RCE flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites\/\">File read flaw in Smart Slider plugin impacts 500K WordPress sites<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sqli-flaw-in-elementor-ally-plugin-impacts-250k-plus-wordpress-sites\/\">SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks\/\">Max severity Flowise RCE vulnerability now exploited in attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability in the Ninja Forms File Upload [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45203","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45203"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45203\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}