Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jetmonsters
Jetmonsters jetformbuilder — Dynamic Blocks Form Builder Wordpress Wordpress wordpress |
|
| Vendors & Products |
Jetmonsters
Jetmonsters jetformbuilder — Dynamic Blocks Form Builder Wordpress Wordpress wordpress |
Sat, 21 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File_Tools::is_same_file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with a Media Field and a Send Email action with file attachment. | |
| Title | JetFormBuilder <= 3.5.6.2 - Unauthenticated Arbitrary File Read via Media Field | |
| Weaknesses | CWE-36 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-03-24T14:05:24.476Z
Reserved: 2026-03-18T10:15:15.895Z
Link: CVE-2026-4373
Updated: 2026-03-24T14:05:19.367Z
Status : Awaiting Analysis
Published: 2026-03-21T07:16:10.380
Modified: 2026-03-23T14:31:37.267
Link: CVE-2026-4373
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:49:40Z