CVE-2025-6463: CWE-73 External Control of File Name or Path in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'entry_delete_upload_files' function in all versions up to, and including, 1.44.2. This makes it possible for unauthenticated attackers to include arbitrary file paths in a form submission. The file will be deleted when the form submission is deleted, whether by an Administrator or via auto-deletion determined by plugin settings. This can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-6463 is a high-severity vulnerability affecting the WordPress plugin 'Forminator Forms – Contact Form, Payment Form & Custom Form Builder' developed by wpmudev. The vulnerability arises from insufficient validation of file paths in the 'entry_delete_upload_files' function present in all versions up to and including 1.44.2. Specifically, unauthenticated attackers can submit arbitrary file paths through form submissions. When a form submission is deleted—either manually by an administrator or automatically via plugin settings—the plugin deletes the files at the specified paths without proper validation. This flaw enables attackers to delete arbitrary files on the server, including critical WordPress files such as wp-config.php. Deleting such files can lead to remote code execution (RCE) by destabilizing the WordPress environment or enabling attackers to upload malicious code or gain elevated privileges. The vulnerability is classified under CWE-73 (External Control of File Name or Path), indicating that external input controls file operations without sufficient validation. The CVSS v3.1 score is 8.8 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential for severe damage is significant given the critical nature of files that can be deleted. The vulnerability affects all versions of the plugin up to 1.44.2, and no official patches or updates are referenced in the provided data, indicating that mitigation may require manual intervention or plugin updates once available.
Potential Impact
For European organizations using WordPress sites with the vulnerable Forminator Forms plugin, this vulnerability poses a critical risk. Successful exploitation can lead to arbitrary file deletion, potentially removing essential configuration files like wp-config.php, which can disrupt website availability and integrity. This disruption can cause significant downtime, loss of customer trust, and potential data breaches if attackers leverage the vulnerability to execute remote code or escalate privileges. Given the widespread use of WordPress in Europe for business, government, and e-commerce websites, the impact could extend to critical infrastructure, financial services, and public sector portals. The ability for unauthenticated attackers to exploit this vulnerability remotely increases the risk of automated attacks and widespread exploitation. Additionally, the deletion of files can lead to data loss and service interruptions, affecting business continuity and compliance with European data protection regulations such as GDPR. Organizations may face reputational damage and regulatory penalties if customer data is compromised or service outages occur due to this vulnerability.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Forminator Forms plugin and verify the version in use. Until an official patch is released, the following specific mitigations are recommended: 1) Disable or deactivate the Forminator Forms plugin to prevent exploitation; 2) Restrict access to WordPress administrative interfaces and form submission endpoints using web application firewalls (WAFs) and IP whitelisting to reduce exposure to unauthenticated attackers; 3) Implement strict file system permissions to limit the WordPress process's ability to delete or modify critical files such as wp-config.php; 4) Monitor logs for suspicious form submissions containing unusual file paths or deletion requests; 5) Regularly back up WordPress files and databases to enable rapid recovery in case of file deletion; 6) Employ security plugins that can detect and block malicious file operations; 7) Once available, promptly apply official patches or updates from wpmudev addressing this vulnerability; 8) Educate administrators about the risk and signs of exploitation to enable quick response. These measures go beyond generic advice by focusing on access control, monitoring, and containment specific to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-6463: CWE-73 External Control of File Name or Path in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder
Description
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'entry_delete_upload_files' function in all versions up to, and including, 1.44.2. This makes it possible for unauthenticated attackers to include arbitrary file paths in a form submission. The file will be deleted when the form submission is deleted, whether by an Administrator or via auto-deletion determined by plugin settings. This can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-6463 is a high-severity vulnerability affecting the WordPress plugin 'Forminator Forms – Contact Form, Payment Form & Custom Form Builder' developed by wpmudev. The vulnerability arises from insufficient validation of file paths in the 'entry_delete_upload_files' function present in all versions up to and including 1.44.2. Specifically, unauthenticated attackers can submit arbitrary file paths through form submissions. When a form submission is deleted—either manually by an administrator or automatically via plugin settings—the plugin deletes the files at the specified paths without proper validation. This flaw enables attackers to delete arbitrary files on the server, including critical WordPress files such as wp-config.php. Deleting such files can lead to remote code execution (RCE) by destabilizing the WordPress environment or enabling attackers to upload malicious code or gain elevated privileges. The vulnerability is classified under CWE-73 (External Control of File Name or Path), indicating that external input controls file operations without sufficient validation. The CVSS v3.1 score is 8.8 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential for severe damage is significant given the critical nature of files that can be deleted. The vulnerability affects all versions of the plugin up to 1.44.2, and no official patches or updates are referenced in the provided data, indicating that mitigation may require manual intervention or plugin updates once available.
Potential Impact
For European organizations using WordPress sites with the vulnerable Forminator Forms plugin, this vulnerability poses a critical risk. Successful exploitation can lead to arbitrary file deletion, potentially removing essential configuration files like wp-config.php, which can disrupt website availability and integrity. This disruption can cause significant downtime, loss of customer trust, and potential data breaches if attackers leverage the vulnerability to execute remote code or escalate privileges. Given the widespread use of WordPress in Europe for business, government, and e-commerce websites, the impact could extend to critical infrastructure, financial services, and public sector portals. The ability for unauthenticated attackers to exploit this vulnerability remotely increases the risk of automated attacks and widespread exploitation. Additionally, the deletion of files can lead to data loss and service interruptions, affecting business continuity and compliance with European data protection regulations such as GDPR. Organizations may face reputational damage and regulatory penalties if customer data is compromised or service outages occur due to this vulnerability.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Forminator Forms plugin and verify the version in use. Until an official patch is released, the following specific mitigations are recommended: 1) Disable or deactivate the Forminator Forms plugin to prevent exploitation; 2) Restrict access to WordPress administrative interfaces and form submission endpoints using web application firewalls (WAFs) and IP whitelisting to reduce exposure to unauthenticated attackers; 3) Implement strict file system permissions to limit the WordPress process's ability to delete or modify critical files such as wp-config.php; 4) Monitor logs for suspicious form submissions containing unusual file paths or deletion requests; 5) Regularly back up WordPress files and databases to enable rapid recovery in case of file deletion; 6) Employ security plugins that can detect and block malicious file operations; 7) Once available, promptly apply official patches or updates from wpmudev addressing this vulnerability; 8) Educate administrators about the risk and signs of exploitation to enable quick response. These measures go beyond generic advice by focusing on access control, monitoring, and containment specific to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-20T22:02:55.475Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6864b8046f40f0eb72917e7d
Added to database: 7/2/2025, 4:39:32 AM
Last enriched: 7/2/2025, 4:54:34 AM
Last updated: 7/2/2025, 1:24:32 PM
Views: 6
Related Threats
CVE-2025-45813: n/a
CriticalCVE-2025-45814: n/a
CriticalCVE-2025-20309: Use of Hard-coded Credentials in Cisco Cisco Unified Communications Manager Session Management Edition Engineering Special
CriticalCVE-2025-45424: n/a
MediumCVE-2025-20310: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Enterprise Chat and Email
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.