CVE-2025-5392: CWE-94 Improper Control of Generation of Code ('Code Injection') in gb-plugins GB Forms DB
The GB Forms DB plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.2 via the gbfdb_talk_to_front() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things.
AI Analysis
Technical Summary
CVE-2025-5392 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) found in the GB Forms DB plugin for WordPress. The vulnerability exists in the gbfdb_talk_to_front() function, which accepts user-supplied input and passes it directly to PHP's call_user_func() without proper sanitization or validation. This unsafe usage allows unauthenticated remote attackers to execute arbitrary PHP code on the affected server. Exploitation can lead to full system compromise, including the ability to install persistent backdoors, escalate privileges by creating new administrative users, and manipulate or exfiltrate sensitive data. The vulnerability affects all versions up to and including 1.0.2 of the plugin. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature and simplicity of exploitation make this a high-risk vulnerability. The plugin is widely used in WordPress environments, which are common targets for attackers due to their popularity and frequent misconfigurations. The vulnerability was publicly disclosed on July 11, 2025, and no official patches or updates have been linked yet, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2025-5392 is severe for organizations worldwide using the GB Forms DB plugin. Successful exploitation results in remote code execution without authentication, allowing attackers to gain full control over the affected web server. This can lead to data breaches, defacement, ransomware deployment, lateral movement within internal networks, and persistent backdoors. The ability to create new administrative users further exacerbates the risk by enabling long-term unauthorized access. Given the widespread use of WordPress and the plugin's presence in various industries, including e-commerce, education, and government websites, the potential for large-scale compromise is significant. Organizations that fail to address this vulnerability risk severe operational disruption, reputational damage, and regulatory penalties due to data loss or exposure.
Mitigation Recommendations
1. Immediate action should be to disable the GB Forms DB plugin until a secure patch or update is released by the vendor. 2. Monitor official gb-plugins channels and WordPress plugin repositories for any security updates or patches addressing CVE-2025-5392. 3. Implement Web Application Firewall (WAF) rules to block suspicious requests targeting the gbfdb_talk_to_front() function or unusual call_user_func() invocations. 4. Conduct thorough code audits and input validation reviews for any custom plugins or themes that might use similar dynamic function calls. 5. Restrict PHP function execution permissions using disable_functions directive in php.ini to limit the impact of potential code execution. 6. Employ network segmentation and least privilege principles to reduce the blast radius if exploitation occurs. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Monitor logs for unusual activity, such as unexpected administrative account creations or code injections. 9. Educate site administrators about the risks of installing unverified plugins and maintaining up-to-date software.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-5392: CWE-94 Improper Control of Generation of Code ('Code Injection') in gb-plugins GB Forms DB
Description
The GB Forms DB plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.2 via the gbfdb_talk_to_front() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5392 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) found in the GB Forms DB plugin for WordPress. The vulnerability exists in the gbfdb_talk_to_front() function, which accepts user-supplied input and passes it directly to PHP's call_user_func() without proper sanitization or validation. This unsafe usage allows unauthenticated remote attackers to execute arbitrary PHP code on the affected server. Exploitation can lead to full system compromise, including the ability to install persistent backdoors, escalate privileges by creating new administrative users, and manipulate or exfiltrate sensitive data. The vulnerability affects all versions up to and including 1.0.2 of the plugin. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature and simplicity of exploitation make this a high-risk vulnerability. The plugin is widely used in WordPress environments, which are common targets for attackers due to their popularity and frequent misconfigurations. The vulnerability was publicly disclosed on July 11, 2025, and no official patches or updates have been linked yet, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2025-5392 is severe for organizations worldwide using the GB Forms DB plugin. Successful exploitation results in remote code execution without authentication, allowing attackers to gain full control over the affected web server. This can lead to data breaches, defacement, ransomware deployment, lateral movement within internal networks, and persistent backdoors. The ability to create new administrative users further exacerbates the risk by enabling long-term unauthorized access. Given the widespread use of WordPress and the plugin's presence in various industries, including e-commerce, education, and government websites, the potential for large-scale compromise is significant. Organizations that fail to address this vulnerability risk severe operational disruption, reputational damage, and regulatory penalties due to data loss or exposure.
Mitigation Recommendations
1. Immediate action should be to disable the GB Forms DB plugin until a secure patch or update is released by the vendor. 2. Monitor official gb-plugins channels and WordPress plugin repositories for any security updates or patches addressing CVE-2025-5392. 3. Implement Web Application Firewall (WAF) rules to block suspicious requests targeting the gbfdb_talk_to_front() function or unusual call_user_func() invocations. 4. Conduct thorough code audits and input validation reviews for any custom plugins or themes that might use similar dynamic function calls. 5. Restrict PHP function execution permissions using disable_functions directive in php.ini to limit the impact of potential code execution. 6. Employ network segmentation and least privilege principles to reduce the blast radius if exploitation occurs. 7. Regularly back up website data and configurations to enable rapid recovery in case of compromise. 8. Monitor logs for unusual activity, such as unexpected administrative account creations or code injections. 9. Educate site administrators about the risks of installing unverified plugins and maintaining up-to-date software.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-30T15:43:16.649Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6870b6b3a83201eaacacdbd4
Added to database: 7/11/2025, 7:01:07 AM
Last enriched: 2/27/2026, 3:16:25 PM
Last updated: 3/24/2026, 10:47:44 PM
Views: 197
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.