CVE-2015-7806
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on WordPress sites using the Form Manager plugin. Attackers can exploit eval injection in the ajax.php file to run malicious commands. All WordPress sites running vulnerable versions of the Form Manager plugin are affected.
💻 Affected Systems
- WordPress Form Manager Plugin
📦 What is this software?
Form Manager by Form Manager Project
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise allowing attackers to install malware, steal data, deface websites, or use the server for further attacks.
Likely Case
Remote code execution leading to website defacement, data theft, or installation of backdoors for persistent access.
If Mitigated
Limited impact if proper web application firewalls and input validation are in place, though risk remains high due to eval injection.
🎯 Exploit Status
Exploitation is straightforward via crafted HTTP requests to ajax.php.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.3
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/1264145
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Form Manager plugin. 4. Click 'Update Now' to version 1.7.3 or later. 5. Verify update completed successfully.
🔧 Temporary Workarounds
Disable Form Manager Plugin
allTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate form-manager
Restrict Access to ajax.php
allBlock direct access to the vulnerable file using web server configuration.
# Apache: <Files "ajax.php"> Require all denied </Files>
# Nginx: location ~* ajax\.php { deny all; }
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block eval injection attempts
- Isolate affected WordPress instance from critical network segments
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Form Manager version. If version is below 1.7.3, system is vulnerable.
Check Version:
wp plugin get form-manager --field=version
Verify Fix Applied:
Confirm Form Manager plugin version is 1.7.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-content/plugins/form-manager/ajax.php
- PHP eval() errors in web server logs
- Suspicious command execution patterns
Network Indicators:
- HTTP requests containing eval() or system() calls targeting ajax.php
- Unusual outbound connections from web server
SIEM Query:
source="web_logs" AND (url="*ajax.php*" AND (method="POST" OR body="*eval*"))
🔗 References
- http://appcheck-ng.com/remote-command-execution-in-wordpress-form-manager-plugin-cve-2015-7806/
- https://plugins.trac.wordpress.org/changeset/1264145
- https://wpvulndb.com/vulnerabilities/8220
- http://appcheck-ng.com/remote-command-execution-in-wordpress-form-manager-plugin-cve-2015-7806/
- https://plugins.trac.wordpress.org/changeset/1264145
- https://wpvulndb.com/vulnerabilities/8220