9.8
CVE-2025-1128
- EPSS 4.05%
- Veröffentlicht 25.02.2025 07:15:18
- Zuletzt bearbeitet 25.02.2025 07:15:18
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Everest Forms <= 3.0.9.4 - Unauthenticated Arbitrary File Upload, Read, and Deletion
The Everest Forms – Contact Forms, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the 'format' method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it possible for unauthenticated attackers to upload, read, and delete arbitrary files on the affected site's server which may make remote code execution, sensitive information disclosure, or a site takeover possible.
Mögliche Gegenmaßnahme
Everest Forms – Contact Form, Payment Form, Quiz, Survey & Custom Form Builder: Update to version 3.0.9.5, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Everest Forms – Contact Form, Payment Form, Quiz, Survey & Custom Form Builder
Version
* - 3.0.9.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpeverest ≫ Everest Forms SwPlatformwordpress Version < 3.0.9.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 4.05% | 0.88 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.