Drag and Drop Multiple File Upload for WooCommerce Security & Risk Analysis

wordpress.org/plugins/drag-and-drop-multiple-file-upload-for-woocommerce

Drag and Drop Multiple File Uploader is a simple, straightforward WordPress plugin extension for WooCommerce.

5K active installs v1.1.7 PHP 5.2.4+ WP 3.0.1+ Updated Mar 11, 2026
ajax-uploaderdrag-and-dropmultiple-fileuploadwoocommerce
86
A · Safe
CVEs total4
Unpatched0
Last CVEMay 8, 2025
Safety Verdict

Is Drag and Drop Multiple File Upload for WooCommerce Safe to Use in 2026?

Generally Safe

Score 86/100

Drag and Drop Multiple File Upload for WooCommerce has a strong security track record. Known vulnerabilities have been patched promptly.

4 known CVEsLast CVE: May 8, 2025Updated 23d ago
Risk Assessment

The plugin "drag-and-drop-multiple-file-upload-for-woocommerce" v1.1.7 exhibits a concerning security posture despite a seemingly limited static attack surface. While there are no apparent AJAX handlers, REST API routes, or shortcodes exposed without authentication in this version, the presence of one cron event could be a potential entry point if not properly secured. The significant concern lies in the vulnerability history, with a total of 4 known CVEs, including 2 critical and 2 high severity vulnerabilities. These past issues, spanning Unrestricted File Uploads, Path Traversal, XSS, and CSRF, suggest a pattern of fundamental security flaws that have been exploited in previous versions. The fact that none of these critical or high vulnerabilities are currently unpatched is a positive sign, but the sheer volume and severity of past issues indicate a history of insecure coding practices within the plugin.

From a code analysis perspective, the plugin uses SQL queries without prepared statements, which is a significant risk for SQL injection vulnerabilities. While most output is properly escaped (88%), the remaining unescaped outputs could still lead to Cross-Site Scripting (XSS) vulnerabilities. The lack of capability checks on any of the identified entry points is also a major weakness, meaning that any potential access to functionality could be leveraged by unauthenticated users. The taint analysis showing zero flows is encouraging, but this can be unreliable, especially when combined with the known vulnerability history.

In conclusion, while the current static analysis of v1.1.7 shows a reduced immediate attack surface and no unpatched critical vulnerabilities, the plugin's historical record of severe security flaws, coupled with the use of raw SQL queries and a complete absence of capability checks, indicates a high underlying risk. Users should exercise extreme caution and consider alternative solutions or ensure rigorous security auditing before deploying this plugin.

Key Concerns

  • Unpatched CVEs: 2 critical, 2 high
  • SQL queries without prepared statements
  • Capability checks: 0
  • Unescaped output (12% of 17)
Vulnerabilities
4

Drag and Drop Multiple File Upload for WooCommerce Security Vulnerabilities

CVEs by Year

2 CVEs in 2023
2023
2 CVEs in 2025
2025
Patched Has unpatched

Severity Breakdown

Critical
2
High
2

4 total CVEs

CVE-2025-4403critical · 9.8Unrestricted Upload of File with Dangerous Type

Drag and Drop Multiple File Upload for WooCommerce <= 1.1.6 - Unauthenticated Arbitrary File Upload via upload Function

May 8, 2025 Patched in 1.1.7 (1d)
CVE-2025-2941critical · 9.8Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Drag and Drop Multiple File Upload for WooCommerce <= 1.1.4 - Unauthenticated Arbitrary File Move

Apr 4, 2025 Patched in 1.1.5 (1d)
CVE-2023-4821high · 7.2Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Drag and Drop Multiple File Upload for WooCommerce <= 1.1.0 - Unauthenticated Stored Cross-Site Scripting

Sep 21, 2023 Patched in 1.1.1 (124d)
CVE-2022-45377high · 8.8Cross-Site Request Forgery (CSRF)

Drag and Drop Multiple File Upload for WooCommerce <= 1.0.8 - Cross-Site Request Forgery in upload and delete_file

Feb 24, 2023 Patched in 1.0.9 (333d)
Code Analysis
Analyzed Mar 16, 2026

Drag and Drop Multiple File Upload for WooCommerce Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
2
15 escaped
Nonce Checks
3
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

88% escaped17 total outputs
Attack Surface

Drag and Drop Multiple File Upload for WooCommerce Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionbefore_woocommerce_initdrag-and-drop-file-uploads-wc.php:58
filterwoocommerce_settings_tabs_arrayinc\admin\dnd-wc-admin-settings.php:20
actioninitinc\class-dnd-upload-wc.php:65
actioninitinc\class-dnd-upload-wc.php:66
actionwoocommerce_loadedinc\class-dnd-upload-wc.php:511
actionadmin_headinc\functions\functions-dnd-upload-wc.php:17
filterwoocommerce_get_settings_pagesinc\functions\functions-dnd-upload-wc.php:94

Scheduled Events 1

wp_dnd_wc_daily_cron
Maintenance & Trust

Drag and Drop Multiple File Upload for WooCommerce Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 11, 2026
PHP min version5.2.4
Downloads79K

Community Trust

Rating98/100
Number of ratings20
Active installs5K
Developer Profile

Drag and Drop Multiple File Upload for WooCommerce Developer Profile

Glen Don Mongaya

4 plugins · 65K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
190 days
View full developer profile
Detection Fingerprints

How We Detect Drag and Drop Multiple File Upload for WooCommerce

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Drag and Drop Multiple File Upload for WooCommerce