Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5392: CWE-94 Improper Control of Generation of Code ('Code Injection') in gb-plugins GB Forms DB

0
Critical
VulnerabilityCVE-2025-5392cvecve-2025-5392cwe-94
Published: Fri Jul 11 2025 (07/11/2025, 06:43:33 UTC)
Source: CVE Database V5
Vendor/Project: gb-plugins
Product: GB Forms DB

Description

The GB Forms DB plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.2 via the gbfdb_talk_to_front() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:16:25 UTC

Technical Analysis

CVE-2025-5392 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) found in the GB Forms DB plugin for WordPress. The vulnerability exists in the gbfdb_talk_to_front() function, which accepts user-supplied input and passes it directly to PHP's call_user_func() without proper sanitization or validation. This unsafe usage allows unauthenticated remote attackers to execute arbitrary PHP code on the affected server. Exploitation can lead to full system compromise, including the ability to install persistent backdoors, escalate privileges by creating new administrative users, and manipulate or exfiltrate sensitive data. The vulnerability affects all versions up to and including 1.0.2 of the plugin. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature and simplicity of exploitation make this a high-risk vulnerability. The plugin is widely used in WordPress environments, which are common targets for attackers due to their popularity and frequent misconfigurations. The vulnerability was publicly disclosed on July 11, 2025, and no official patches or updates have been linked yet, increasing the urgency for mitigation.

Potential Impact

The impact of CVE-2025-5392 is severe for organizations worldwide using the GB Forms DB plugin. Successful exploitation results in remote code execution without authentication, allowing attackers to gain full control over the affected web server. This can lead to data breaches, defacement, ransomware deployment, lateral movement within internal networks, and persistent backdoors. The ability to create new administrative users further exacerbates the risk by enabling long-term unauthorized access. Given the widespread use of WordPress and the plugin's presence in various industries, including e-commerce, education, and government websites, the potential for large-scale compromise is significant. Organizations that fail to address this vulnerability risk severe operational disruption, reputational damage, and regulatory penalties due to data loss or exposure.

Mitigation Recommendations

1. Immediate action should be to disable the GB Forms DB plugin until a secure patch or update is released by the vendor. 2. Monitor official gb-plugins channels and WordPress plugin repositories for any security updates or patches addressing CVE-2025-5392. 3. Implement Web Application Firewall (WAF) rules to block suspicious requests targeting the gbfdb_talk_to_front() function or unusual call_user_func() invocations. 4. Conduct thorough code audits and input validation reviews for any custom plugins or themes that might use similar dynamic function calls. 5. Restrict PHP function execution permissions using disable_functions directive in php.ini to limit the impact of potential code execution. 6. Employ network segmentation and least privilege principles to reduce the blast radius if exploitation occurs. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Monitor logs for unusual activity, such as unexpected administrative account creations or code injections. 9. Educate site administrators about the risks of installing unverified plugins and maintaining up-to-date software.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-30T15:43:16.649Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6870b6b3a83201eaacacdbd4

Added to database: 7/11/2025, 7:01:07 AM

Last enriched: 2/27/2026, 3:16:25 PM

Last updated: 3/24/2026, 10:47:44 PM

Views: 197

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses