CVE-2015-10137
CRITICALWebsite Contact Form With File Upload <1.3.4 - RCE
Title source: llmDescription
The Website Contact Form With File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_file()' function in versions up to, and including, 1.3.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Exploits (2)
nomisec
WORKING POC
by Kai-One001 · poc
https://github.com/Kai-One001/-CVE-2015-10137-WordPress-N-Media-Website-Contact-Form-with-File-Upload-1.3.4
metasploit
WORKING POC
EXCELLENT
by Claudio Viviani · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_nmediawebsite_file_upload.rb
References (7)
Scores
CVSS v3
9.8
EPSS
0.6747
EPSS Percentile
98.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (2)
najeebmedia/website_contact_form_with_file_upload
< 1.3.4
N-Media/Website Contact Form With File Upload
< 1.3.4
Published
Jul 22, 2025
Tracked Since
Feb 18, 2026