6.3
CVE-2025-4208
- EPSS 0.17%
- Veröffentlicht 08.05.2025 11:13:44
- Zuletzt bearbeitet 04.06.2025 22:58:48
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
NEX-Forms – Ultimate Form Builder – Contact forms and much more <= 8.9.1 - Authenticated (Custom) Limited Code Execution via get_table_records Function
The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Limited Code Execution in all versions up to, and including, 8.9.1 via the get_table_records function. This is due to the unsanitized use of user-supplied input in call_user_func(). This makes it possible for authenticated attackers, with Custom-level access, to execute arbitrary PHP functions that meet specific constraints (static methods or global functions accepting a single array parameter).
Mögliche Gegenmaßnahme
NEX-Forms – Ultimate Forms Plugin for WordPress: Update to version 8.9.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
NEX-Forms – Ultimate Forms Plugin for WordPress
Version
*-8.9.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Basixonline ≫ Nex-forms SwPlatformwordpress Version <= 8.9.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.17% | 0.382 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 6.3 | 2.8 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.