Skip to main content

CVE-2025-6464: CWE-502 Deserialization of Untrusted Data in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder

High
VulnerabilityCVE-2025-6464cvecve-2025-6464cwe-502
Published: Wed Jul 02 2025 (07/02/2025, 05:29:17 UTC)
Source: CVE Database V5
Vendor/Project: wpmudev
Product: Forminator Forms – Contact Form, Payment Form & Custom Form Builder

Description

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.44.2 via deserialization of untrusted input in the 'entry_delete_upload_files' function. This makes it possible for unauthenticated attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. Deserialization occurs when the form submission is deleted, whether by an Administrator or via auto-deletion determined by plugin settings.

AI-Powered Analysis

AILast updated: 07/02/2025, 06:09:33 UTC

Technical Analysis

CVE-2025-6464 is a high-severity vulnerability affecting the WordPress plugin 'Forminator Forms – Contact Form, Payment Form & Custom Form Builder' developed by wpmudev. The vulnerability arises from unsafe deserialization of untrusted data in the 'entry_delete_upload_files' function present in all versions up to and including 1.44.2. Specifically, the plugin processes serialized PHP objects during the deletion of form submissions, either manually by an administrator or automatically based on plugin settings. An unauthenticated attacker can exploit this by injecting a malicious PHP object via a PHAR (PHP Archive) file. However, the vulnerability alone does not directly lead to code execution or file manipulation because the plugin itself lacks a gadget chain (POP chain) necessary for PHP Object Injection exploitation. The risk materializes only if the WordPress site has additional plugins or themes installed that contain such POP chains, enabling an attacker to leverage the deserialization flaw to execute arbitrary code, delete arbitrary files, or access sensitive data. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector being network (remote), requiring no privileges but some user interaction (UI:R), and high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild, but the presence of this vulnerability in a widely used WordPress plugin combined with the common practice of installing multiple plugins and themes increases the attack surface. The vulnerability was published on July 2, 2025, and no patches have been linked yet, emphasizing the need for immediate attention and mitigation by site administrators.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress websites with the Forminator plugin installed. The potential impact includes unauthorized deletion of files, exposure of sensitive data, and remote code execution, which can lead to website defacement, data breaches, service disruption, and potential lateral movement within the network. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, exploitation could disrupt business operations and damage reputation. The requirement for a POP chain in other plugins or themes means that organizations with complex or heavily customized WordPress environments are at higher risk. Additionally, the vulnerability could be leveraged to bypass security controls, leading to GDPR compliance issues due to unauthorized data access or loss. The high impact on confidentiality, integrity, and availability combined with the ease of remote exploitation without authentication makes this a critical concern for European entities hosting customer-facing or internal portals using this plugin.

Mitigation Recommendations

1. Immediate audit of WordPress installations to identify the presence of the Forminator Forms plugin and its version. 2. Disable or remove the plugin if not essential until a patch is available. 3. Monitor official wpmudev channels and WordPress plugin repositories for security updates or patches addressing CVE-2025-6464 and apply them promptly. 4. Conduct a thorough review of all installed plugins and themes to identify potential POP chains that could be exploited in conjunction with this vulnerability; remove or update risky components. 5. Implement Web Application Firewalls (WAF) with rules to detect and block suspicious PHAR file uploads or deserialization attempts targeting the vulnerable function. 6. Restrict file upload permissions and validate all user inputs rigorously to prevent injection of malicious serialized objects. 7. Enable detailed logging and monitoring of form submission deletions and related file operations to detect anomalous activities. 8. Educate administrators about the risks of deserialization vulnerabilities and the importance of minimizing plugin/theme bloat to reduce attack surface. 9. Consider isolating WordPress environments and limiting privileges to minimize potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-21T00:27:32.323Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6864c9966f40f0eb7291a3d0

Added to database: 7/2/2025, 5:54:30 AM

Last enriched: 7/2/2025, 6:09:33 AM

Last updated: 7/13/2025, 12:04:56 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats