Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60084: Deserialization of Untrusted Data in add-ons.org PDF for Elementor Forms + Drag And Drop Template Builder

0
High
VulnerabilityCVE-2025-60084cvecve-2025-60084
Published: Thu Dec 18 2025 (12/18/2025, 07:22:07 UTC)
Source: CVE Database V5
Vendor/Project: add-ons.org
Product: PDF for Elementor Forms + Drag And Drop Template Builder

Description

Deserialization of Untrusted Data vulnerability in add-ons.org PDF for Elementor Forms + Drag And Drop Template Builder pdf-for-elementor-forms allows Object Injection.This issue affects PDF for Elementor Forms + Drag And Drop Template Builder: from n/a through <= 6.3.1.

AI-Powered Analysis

AILast updated: 12/18/2025, 08:31:09 UTC

Technical Analysis

CVE-2025-60084 is a vulnerability classified as deserialization of untrusted data in the 'PDF for Elementor Forms + Drag And Drop Template Builder' plugin developed by add-ons.org. This plugin integrates with Elementor Forms in WordPress to provide PDF generation and drag-and-drop template building capabilities. The vulnerability exists in versions up to and including 6.3.1, where the plugin improperly handles serialized data inputs. Deserialization vulnerabilities occur when untrusted data is deserialized without sufficient validation, allowing attackers to inject malicious objects. This can lead to object injection attacks, potentially enabling remote code execution (RCE), privilege escalation, or denial of service (DoS). The vulnerability does not require prior authentication, increasing its risk profile. Although no public exploits have been reported yet, the nature of the flaw makes it a critical concern once weaponized. The plugin’s role in processing form data and generating PDFs means that compromised instances could lead to data leakage, unauthorized system access, or disruption of business processes. The lack of a CVSS score indicates that the vulnerability is newly published and awaiting further assessment. The vulnerability was reserved in late September 2025 and published in December 2025, indicating recent discovery. The absence of patch links suggests that a fix may not yet be available, emphasizing the need for vigilance and interim protective measures.

Potential Impact

For European organizations, the impact of CVE-2025-60084 can be significant, especially for those relying on WordPress sites with Elementor and this specific plugin for customer-facing forms, document generation, or internal workflows. Exploitation could lead to unauthorized execution of code on web servers, resulting in data breaches, defacement, or service outages. Confidential information submitted via forms could be exposed or manipulated, undermining data integrity and privacy compliance obligations such as GDPR. The availability of affected systems could be compromised, disrupting business operations and damaging reputation. Organizations in sectors with high regulatory scrutiny, such as finance, healthcare, and government, face elevated risks. Additionally, the ease of exploitation without authentication increases the likelihood of automated attacks or exploitation by opportunistic threat actors. The absence of known exploits currently provides a window for proactive defense, but the threat landscape could rapidly evolve once exploit code becomes available.

Mitigation Recommendations

1. Monitor official channels from add-ons.org and Patchstack for patches or updates addressing CVE-2025-60084 and apply them immediately upon release. 2. Until a patch is available, consider disabling or removing the affected plugin from production environments, especially on publicly accessible sites. 3. Implement web application firewall (WAF) rules to detect and block suspicious serialized data payloads targeting the plugin’s endpoints. 4. Restrict access to form submission endpoints through IP whitelisting or authentication where feasible to reduce exposure. 5. Conduct thorough input validation and sanitization on all data processed by the plugin to prevent malicious object injection. 6. Regularly audit WordPress installations for outdated plugins and monitor logs for unusual activity indicative of exploitation attempts. 7. Employ network segmentation and least privilege principles to limit the impact of potential compromises. 8. Educate development and security teams about the risks of deserialization vulnerabilities and secure coding practices. 9. Prepare incident response plans specifically addressing web application compromise scenarios involving WordPress plugins.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:02.782Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04e4eb3efac36700388

Added to database: 12/18/2025, 7:42:06 AM

Last enriched: 12/18/2025, 8:31:09 AM

Last updated: 12/19/2025, 8:09:07 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats