CVE-2025-1128
📋 TL;DR
This vulnerability in the Everest Forms WordPress plugin allows unauthenticated attackers to upload, read, and delete arbitrary files on affected servers. It affects all versions up to 3.0.9.4 due to missing file type and path validation. This can lead to remote code execution, sensitive data exposure, or complete site compromise.
💻 Affected Systems
- Everest Forms WordPress Plugin
📦 What is this software?
Everest Forms by Wpeverest
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via remote code execution, leading to data theft, malware deployment, or use as attack platform
Likely Case
Website defacement, data exfiltration, or backdoor installation for persistent access
If Mitigated
Limited file system access if proper file permissions and web application firewalls are configured
🎯 Exploit Status
Proof of concept available in public references; unauthenticated nature makes exploitation trivial
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.9.5 and later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3243663/everest-forms#file7
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Everest Forms and click 'Update Now'
4. Verify version is 3.0.9.5 or higher
🔧 Temporary Workarounds
Disable Everest Forms Plugin
allTemporarily disable the vulnerable plugin until patching is possible
wp plugin deactivate everest-forms
Web Application Firewall Rule
allBlock requests to Everest Forms upload endpoints
Add WAF rule to block requests containing '/wp-content/plugins/everest-forms/' in URI
🧯 If You Can't Patch
- Implement strict file system permissions to limit web server write access
- Deploy web application firewall with rules blocking Everest Forms upload functionality
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Everest Forms version number
Check Version:
wp plugin get everest-forms --field=version
Verify Fix Applied:
Verify Everest Forms version is 3.0.9.5 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/plugins/everest-forms/
- File deletion/modification in unexpected directories
- POST requests to Everest Forms upload endpoints
Network Indicators:
- HTTP requests to /wp-content/plugins/everest-forms/includes/abstracts/class-evf-form-fields-upload.php with suspicious parameters
SIEM Query:
source="web_server" AND (uri="/wp-content/plugins/everest-forms/" OR user_agent LIKE "%Everest%Forms%") AND (method="POST" OR status_code>=400)
🔗 References
- https://github.com/wpeverest/everest-forms/commit/7d37858d2c614aa107b0f495fe50819a3867e7f5
- https://github.com/wpeverest/everest-forms/pull/1406/files
- https://plugins.trac.wordpress.org/changeset/3237831/everest-forms/trunk/includes/abstracts/class-evf-form-fields-upload.php#file0
- https://plugins.trac.wordpress.org/changeset/3243663/everest-forms#file7
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8c04d8c9-acad-4832-aa8a-8372c58a0387?source=cve