Skip to content
Security

50,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in Ninja Forms Plugin

A critical vulnerability in Ninja Forms – File Upload plugin exposes 50,000 WordPress sites to remote code execution attacks. Update to version 3.3.27 immediately.

50,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in Ninja Forms Plugin
Photo: Szabó Viktor on Pexels

Some links on this page are affiliate links. We may earn a commission when you click through and make a purchase, at no additional cost to you.

A critical vulnerability in the Ninja Forms – File Upload WordPress plugin has exposed an estimated 50,000 sites to potential remote code execution attacks. Identified as CVE-2026-0740, this Arbitrary File Upload vulnerability allows unauthenticated attackers to upload malicious files to a server, potentially compromising the entire site.

Key Takeaways

  • Critical vulnerability (CVSS 9.8) in Ninja Forms – File Upload plugin affects up to version 3.3.26.
  • 50,000 active installations are at risk if updates to version 3.3.27 are not applied.
  • Wordfence Premium users received protection on January 8, 2026; free users on February 7, 2026.
  • Exploits target missing file type validation in the handle_upload() function.
  • Bounty program incentives have been increased for high-threat vulnerability submissions.

Details of the Vulnerability

On January 8, 2026, researcher Sélim Lanouar responsibly disclosed the vulnerability to Wordfence through their Bug Bounty Program, earning a $2,145 reward. The vulnerability stems from missing validation in the plugin’s handle_upload() function, which enables attackers to upload arbitrary files to a website’s server.

The vulnerability was partially patched in version 3.3.25 and fully addressed in version 3.3.27, released on March 19, 2026. Affected versions include all releases up to 3.3.26. Wordfence quickly deployed firewall rules to protect Premium users on the day of disclosure, extending protection to free users on February 7, 2026.

Technical Analysis

Ninja Forms – File Upload is a popular plugin for enabling file uploads as part of the Ninja Forms ecosystem. The vulnerability resides in the NF_FU_AJAX_Controllers_Uploads class, specifically within the handle_upload() function. This function, designed to process file uploads, fails to adequately validate file types, opening the door to malicious uploads.

The _process() function facilitates saving these files to the server using move_uploaded_file(), but insufficient sanitization of filenames and extensions exacerbates the risk. Although partial fixes were implemented in earlier patches, version 3.3.27 introduced comprehensive validation measures to mitigate this threat.

Wordfence Bug Bounty Program and Incentives

Wordfence’s Bug Bounty Program has proven instrumental in identifying and patching vulnerabilities within the WordPress ecosystem. To encourage further research, Wordfence is running a limited-time Triple Threat Bug Bounty Challenge, offering enhanced rewards for discovering high-threat vulnerabilities.

Researchers can earn double bounties for qualifying vulnerabilities, plus a 30% bonus for plugins with 30,000+ installs. Additionally, every three valid high-threat vulnerabilities reported during this promotion, with software having at least 1,000 active installs, qualifies for a $300 extra reward.

What This Means for WordPress Users

For WordPress site operators using Ninja Forms – File Upload, immediate action is required. Update the plugin to version 3.3.27 to eliminate the risk of exploitation. Sites running Wordfence Premium or free versions are already shielded from active exploits targeting this vulnerability.

This incident underscores the importance of maintaining plugin updates and leveraging robust security solutions like Wordfence. Agencies and freelancers managing multiple WordPress sites should prioritize vulnerability monitoring to ensure all plugins are patched promptly.

On a broader scale, the case highlights the ongoing need for vigilance from plugin developers. Security gaps in widely-used plugins can have a ripple effect across the WordPress ecosystem, emphasizing the critical role of responsible disclosure and rapid patch deployment.

Frequently Asked Questions

What is the CVE ID for this vulnerability?

The CVE ID for this vulnerability is CVE-2026-0740.

How can I protect my site?

Update Ninja Forms – File Upload to version 3.3.27 and ensure your site is protected by a security solution like Wordfence.

When was the vulnerability disclosed?

The vulnerability was disclosed to Wordfence on January 8, 2026.

What rewards are available in the Bug Bounty Program?

Researchers can earn triple incentives for high-threat vulnerabilities through the Triple Threat Bug Bounty Challenge running until April 6, 2026.

What versions of Ninja Forms – File Upload are affected?

Versions up to and including 3.3.26 are affected. The patched version is 3.3.27.

Related News