CVE-2025-6464

7.5 HIGH

📋 TL;DR

The Forminator WordPress plugin is vulnerable to PHP Object Injection via deserialization of untrusted input when form submissions are deleted. This allows unauthenticated attackers to inject malicious PHP objects through PHAR files, but exploitation requires a separate plugin or theme with a POP chain. All WordPress sites using Forminator versions up to 1.44.2 are affected.

💻 Affected Systems

Products:
  • Forminator Forms – Contact Form, Payment Form & Custom Form Builder for WordPress
Versions: All versions up to and including 1.44.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires either administrator action to delete form submissions or auto-deletion via plugin settings. Impact depends on presence of POP chains in other installed plugins/themes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

If a POP chain is present via another plugin/theme, attackers could execute arbitrary code, delete files, or steal sensitive data, potentially leading to complete site compromise.

🟠

Likely Case

Most sites will not have compatible POP chains, resulting in no immediate impact, but the vulnerability creates a dangerous attack surface that could be exploited if vulnerable components are added later.

🟢

If Mitigated

With proper security controls like WAF rules blocking PHAR file uploads and regular plugin updates, the risk is significantly reduced even if the vulnerability exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires finding or creating a compatible POP chain from other installed components, which adds complexity but is feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.44.2

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?old_path=%2Fforminator&old=3319860&new_path=%2Fforminator&new=3319860&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Forminator and click 'Update Now'. 4. Verify update to version after 1.44.2.

🔧 Temporary Workarounds

Block PHAR file uploads via WAF

all

Configure web application firewall to block uploads containing PHAR file signatures

Disable form submission auto-deletion

all

Change Forminator settings to prevent automatic deletion of form submissions

🧯 If You Can't Patch

  • Temporarily disable the Forminator plugin until patching is possible
  • Implement strict file upload restrictions to block PHAR files at the server level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Forminator version. If version is 1.44.2 or lower, you are vulnerable.

Check Version:

wp plugin get forminator --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify Forminator version is higher than 1.44.2 in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with .phar extensions
  • Multiple failed attempts to access form deletion endpoints
  • Unexpected PHP errors related to unserialize()

Network Indicators:

  • HTTP POST requests to forminator endpoints with serialized data
  • Uploads containing PHAR file signatures

SIEM Query:

source="web_logs" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path LIKE "%/forminator/%") AND (method="POST" AND (request_body LIKE "%phar:%" OR request_body LIKE "%O:%"))

🔗 References

📤 Share & Export