CVE-2015-10137

CRITICAL

Website Contact Form With File Upload <1.3.4 - RCE

Title source: llm

Description

The Website Contact Form With File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_file()' function in versions up to, and including, 1.3.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.

Exploits (2)

nomisec WORKING POC
by Kai-One001 · poc
https://github.com/Kai-One001/-CVE-2015-10137-WordPress-N-Media-Website-Contact-Form-with-File-Upload-1.3.4
metasploit WORKING POC EXCELLENT
by Claudio Viviani · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_nmediawebsite_file_upload.rb

Scores

CVSS v3 9.8
EPSS 0.6747
EPSS Percentile 98.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-434
Status published
Products (2)
najeebmedia/website_contact_form_with_file_upload < 1.3.4
N-Media/Website Contact Form With File Upload < 1.3.4
Published Jul 22, 2025
Tracked Since Feb 18, 2026