Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jetmonsters
Jetmonsters jetformbuilder — Dynamic Blocks Form Builder Wordpress Wordpress wordpress |
|
| Vendors & Products |
Jetmonsters
Jetmonsters jetformbuilder — Dynamic Blocks Form Builder Wordpress Wordpress wordpress |
Sat, 21 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File_Tools::is_same_file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with a Media Field and a Send Email action with file attachment. | |
| Title | JetFormBuilder <= 3.5.6.2 - Unauthenticated Arbitrary File Read via Media Field | |
| Weaknesses | CWE-36 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:37:34.037Z
Reserved: 2026-03-18T10:15:15.895Z
Link: CVE-2026-4373
Updated: 2026-03-24T14:05:19.367Z
Status : Deferred
Published: 2026-03-21T07:16:10.380
Modified: 2026-04-24T16:27:44.277
Link: CVE-2026-4373
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:41:18Z