CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 08, 2026

Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover

Security Week Archived Apr 08, 2026 ✓ Full text saved

The vulnerability allows hackers to upload arbitrary files to a site’s server and achieve remote code execution. The post Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    A critical-severity vulnerability in the File Uploads addon for the Ninja Forms WordPress plugin could allow threat actors to take over vulnerable deployments, cybersecurity firm Defiant warns. Defiant says the affected addon is used by roughly 50,000 websites, and the company has seen thousands of attempts to exploit the vulnerability.  Tracked as CVE-2026-0740 (CVSS score of 9.8), the security defect is described as an unauthenticated arbitrary file upload issue rooted in a missing file type validation. The addon was designed to provide file upload functionality for the Ninja Forms plugin. The CVE exists in the function that saves the uploaded file to the uploads folder. The file type check it performs is not sufficient, as it does not check the destination filename before the file is moved to the uploads directory, which makes it possible to upload files with the .php extension. “Since no filename sanitization is utilized, the malicious parameter also facilitates path traversal, allowing the file to be moved even to the webroot directory,” Defiant explains. An unauthenticated attacker could exploit this vulnerability to upload malicious PHP code to a vulnerable website’s server, and then access the file to achieve remote code execution (RCE), Defiant notes. According to the cybersecurity firm, an attacker could abuse the bug to deploy web shells and take complete control of the targeted site. CVE-2026-0740, Defiant says, was identified and reported via the Wordfence bug bounty program in January by security researcher Sélim Lanouar, who received a $2,145 bounty reward for it. Users are advised to upgrade to Ninja Forms – File Uploads version 3.3.27 as soon as possible, as all previous iterations are affected by the bug. Related: Critical Flowise Vulnerability in Attacker Crosshairs Related: GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data Related: Ally WordPress Plugin Flaw Exposes Over 200,000 Websites to Attacks Related: Critical King Addons Vulnerability Exploited to Hack WordPress Sites WRITTEN BY Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems German Police Unmask REvil Ransomware Leader Google DeepMind Researchers Map Web Attacks Against AI Agents Guardarian Users Targeted With Malicious Strapi NPM Packages North Korean Hackers Target High-Profile Node.js Maintainers Fortinet Rushes Emergency Fixes for Exploited Zero-Day European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack Latest News Evasive Masjesu DDoS Botnet Targets IoT Devices US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks The New Rules of Engagement: Matching Agentic Attack Speed Trent AI Emerges From Stealth With $13 Million in Funding Critical Flowise Vulnerability in Attacker Crosshairs Severe StrongBox Vulnerability Patched in Android Trending Webinar: Securing Fragile OT In An Exposed World March 10, 2026 Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure. Register Webinar: Why Automated Pentesting Alone Is Not Enough April 7, 2026 Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline. Register People on the Move Scott Goree has been appointed Senior Vice President of Channel and Alliances at Delinea. Kai has named Nick Degnan as Chief Revenue Officer. Joe Sullivan has been appointed Strategic Advisor at cloud security firm Upwind. More People On The Move Expert Insights The New Rules Of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle With Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) How To 10x Your Vulnerability Management Program In The Agentic Era The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗