CVE-2025-8420

8.1 HIGH

📋 TL;DR

The Request a Quote Form WordPress plugin versions ≤2.5.2 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP functions on the server. This occurs because the plugin doesn't properly validate user input before using it as a function name. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Request a Quote Form WordPress plugin
Versions: ≤ 2.5.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: WordPress sites with the vulnerable plugin installed and activated are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to install backdoors, steal data, deface websites, or pivot to other systems.

🟠

Likely Case

Website defacement, data theft, cryptocurrency mining, or installation of persistent backdoors.

🟢

If Mitigated

Limited impact due to function parameter restrictions, but still allows execution of dangerous PHP functions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward but limited to calling functions without parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.3

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3338854%40request-a-quote&new=3338854%40request-a-quote&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Request a Quote Form' and update to version 2.5.3 or later. 4. If update not available, deactivate and delete the plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Deactivate the Request a Quote Form plugin to prevent exploitation

wp plugin deactivate request-a-quote-form

Web Application Firewall rule

all

Block requests containing emd_form_builder_lite_pagenum parameter

🧯 If You Can't Patch

  • Deactivate and remove the Request a Quote Form plugin immediately
  • Implement strict WAF rules to block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Request a Quote Form version. If version ≤2.5.2, you are vulnerable.

Check Version:

wp plugin get request-a-quote-form --field=version

Verify Fix Applied:

Verify plugin version is 2.5.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'emd_form_builder_lite_pagenum' parameter with suspicious function names
  • Unusual PHP function calls in web server logs

Network Indicators:

  • POST requests to WordPress endpoints with emd_form_builder_lite_pagenum parameter

SIEM Query:

source="web_logs" AND "emd_form_builder_lite_pagenum"

🔗 References

📤 Share & Export