The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to reflected cross-site scripting due to missing sanitization of the files filename parameter found in the ~/includes/ajax/controllers/uploads.php file which can be used by unauthenticated attackers to add malicious web scripts to vulnerable WordPress sites, in versions up to and including 3.3.12.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15925 | The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to reflected cross-site scripting due to missing sanitization of the files filename parameter found in the ~/includes/ajax/controllers/uploads.php file which can be used by unauthenticated attackers to add malicious web scripts to vulnerable WordPress sites, in versions up to and including 3.3.12. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Ninja Forms - File Uploads Extension <= 3.3.12 - Reflected Cross-Site Scripting |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:05:57.998Z
Reserved: 2022-03-08T00:00:00.000Z
Link: CVE-2022-0889
No data.
Status : Modified
Published: 2022-03-23T20:15:10.523
Modified: 2026-04-08T18:17:21.623
Link: CVE-2022-0889
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD