First published: Tue Feb 25 2025(Updated: )
The Everest Forms – Contact Forms, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the 'format' method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it possible for unauthenticated attackers to upload, read, and delete arbitrary files on the affected site's server which may make remote code execution, sensitive information disclosure, or a site takeover possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Everest Forms | <=3.0.9.4 | |
Everest Forms | <3.0.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1128 is classified as a high severity vulnerability due to its potential for arbitrary file upload, read, and deletion.
To fix CVE-2025-1128, update the Everest Forms plugin to version 3.0.9.5 or later.
CVE-2025-1128 can allow attackers to upload malicious files, potentially leading to unauthorized access or data loss.
If you are using Everest Forms plugin version 3.0.9.4 or earlier, your site is vulnerable to CVE-2025-1128.
The vendor for CVE-2025-1128 is Everest Forms, which develops the affected plugin for WordPress.