CVE-2025-30809

5.4 MEDIUM

📋 TL;DR

A missing authorization vulnerability in the Shahjada Live Forms WordPress plugin allows attackers to change plugin settings without proper authentication. This affects all WordPress sites running Live Forms versions up to 4.8.4, potentially compromising form functionality and site integrity.

💻 Affected Systems

Products:
  • Shahjada Live Forms WordPress Plugin
Versions: n/a through 4.8.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin version are affected; no special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify form configurations to steal user data, inject malicious content, or disrupt form operations, leading to data breaches or site defacement.

🟠

Likely Case

Unauthorized users alter form settings to redirect submissions, capture sensitive information, or disable forms, causing operational issues and privacy violations.

🟢

If Mitigated

With proper access controls, impact is minimal as only authorized administrators can modify settings, limiting exposure to misconfigurations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation likely involves simple HTTP requests to modify settings; no authentication needed based on CWE-862.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/liveforms/vulnerability/wordpress-wordpress-contact-form-drag-and-drop-form-builder-plugin-live-forms-plugin-4-8-4-settings-change-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Live Forms and click 'Update Now' if available. 4. Alternatively, download the latest version from the WordPress plugin repository and upload it manually.

🔧 Temporary Workarounds

Disable Live Forms Plugin

all

Temporarily deactivate the plugin to prevent exploitation until patching is possible.

wp plugin deactivate liveforms

Restrict Access to Plugin Settings

linux

Use web application firewall (WAF) rules to block unauthorized requests to plugin admin endpoints.

iptables -A INPUT -p tcp --dport 80 -m string --string '/wp-admin/admin.php?page=liveforms' --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the WordPress instance from untrusted networks.
  • Enable detailed logging and monitoring for unauthorized access attempts to plugin settings pages.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 4.8.4 or lower, it is vulnerable.

Check Version:

wp plugin get liveforms --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 4.8.5 or higher in the same location.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=liveforms from unauthorized IPs
  • Changes to plugin settings without corresponding admin user activity in logs

Network Indicators:

  • HTTP traffic to plugin admin endpoints from non-admin sources
  • Unexpected modifications in form submission handling

SIEM Query:

source="wordpress.log" AND (url_path="/wp-admin/admin.php?page=liveforms" AND user_role!="administrator")

🔗 References

📤 Share & Export