CVE-2025-7384: CWE-502 Deserialization of Untrusted Data in crmperks Database for Contact Form 7, WPforms, Elementor forms
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
AI Analysis
Technical Summary
CVE-2025-7384 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting the crmperks Database plugin for Contact Form 7, WPforms, and Elementor forms on WordPress. The flaw exists in the get_lead_detail function, where untrusted input is deserialized without proper validation or sanitization, allowing unauthenticated attackers to perform PHP Object Injection. This injection can leverage a Property Oriented Programming (POP) gadget chain present in the Contact Form 7 plugin, facilitating arbitrary file deletion on the server. Specifically, attackers can delete the wp-config.php file, which is crucial for WordPress configuration, potentially causing denial of service or enabling remote code execution if the system attempts to recreate or execute code based on missing or manipulated configuration files. The vulnerability affects all plugin versions up to and including 1.4.3. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making exploitation straightforward. The vulnerability impacts confidentiality, integrity, and availability severely, as attackers can execute arbitrary code or disrupt service. Although no exploits have been observed in the wild yet, the high CVSS score (9.8) indicates a critical threat that demands immediate attention. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
The impact of CVE-2025-7384 is severe for organizations using WordPress sites with the affected crmperks Database plugin alongside Contact Form 7, WPforms, or Elementor forms. Successful exploitation can lead to complete compromise of the web server through remote code execution, allowing attackers to execute arbitrary commands, steal sensitive data, or pivot within the network. Deletion of wp-config.php can cause site downtime, loss of configuration, and potential data loss, severely affecting availability and integrity. Given the widespread use of these popular WordPress plugins, many websites including e-commerce, corporate, and governmental portals are at risk. The vulnerability's unauthenticated and network-exploitable nature means attackers can target sites en masse without needing credentials or user interaction, increasing the likelihood of automated attacks and wormable spread. This can result in significant reputational damage, financial loss, and regulatory consequences for affected organizations worldwide.
Mitigation Recommendations
1. Immediate upgrade to a patched version of the crmperks Database plugin once available; monitor vendor announcements closely. 2. If patches are not yet released, disable or remove the crmperks Database plugin temporarily to eliminate the attack surface. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious deserialization payloads and PHP Object Injection attempts targeting the get_lead_detail function. 4. Restrict file system permissions to prevent the web server user from deleting critical files like wp-config.php, limiting the impact of file deletion attempts. 5. Monitor web server and application logs for unusual activity, especially POST requests to form endpoints and errors related to deserialization or file operations. 6. Employ runtime application self-protection (RASP) tools that can detect and block unsafe deserialization at runtime. 7. Conduct a thorough security audit of all WordPress plugins and remove or replace those that are unmaintained or vulnerable. 8. Educate site administrators on the risks of installing plugins from untrusted sources and the importance of timely updates. 9. Use intrusion detection systems (IDS) to alert on exploitation attempts targeting this vulnerability. 10. Regularly back up WordPress site files and databases to enable rapid recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-7384: CWE-502 Deserialization of Untrusted Data in crmperks Database for Contact Form 7, WPforms, Elementor forms
Description
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-7384 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting the crmperks Database plugin for Contact Form 7, WPforms, and Elementor forms on WordPress. The flaw exists in the get_lead_detail function, where untrusted input is deserialized without proper validation or sanitization, allowing unauthenticated attackers to perform PHP Object Injection. This injection can leverage a Property Oriented Programming (POP) gadget chain present in the Contact Form 7 plugin, facilitating arbitrary file deletion on the server. Specifically, attackers can delete the wp-config.php file, which is crucial for WordPress configuration, potentially causing denial of service or enabling remote code execution if the system attempts to recreate or execute code based on missing or manipulated configuration files. The vulnerability affects all plugin versions up to and including 1.4.3. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making exploitation straightforward. The vulnerability impacts confidentiality, integrity, and availability severely, as attackers can execute arbitrary code or disrupt service. Although no exploits have been observed in the wild yet, the high CVSS score (9.8) indicates a critical threat that demands immediate attention. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
The impact of CVE-2025-7384 is severe for organizations using WordPress sites with the affected crmperks Database plugin alongside Contact Form 7, WPforms, or Elementor forms. Successful exploitation can lead to complete compromise of the web server through remote code execution, allowing attackers to execute arbitrary commands, steal sensitive data, or pivot within the network. Deletion of wp-config.php can cause site downtime, loss of configuration, and potential data loss, severely affecting availability and integrity. Given the widespread use of these popular WordPress plugins, many websites including e-commerce, corporate, and governmental portals are at risk. The vulnerability's unauthenticated and network-exploitable nature means attackers can target sites en masse without needing credentials or user interaction, increasing the likelihood of automated attacks and wormable spread. This can result in significant reputational damage, financial loss, and regulatory consequences for affected organizations worldwide.
Mitigation Recommendations
1. Immediate upgrade to a patched version of the crmperks Database plugin once available; monitor vendor announcements closely. 2. If patches are not yet released, disable or remove the crmperks Database plugin temporarily to eliminate the attack surface. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious deserialization payloads and PHP Object Injection attempts targeting the get_lead_detail function. 4. Restrict file system permissions to prevent the web server user from deleting critical files like wp-config.php, limiting the impact of file deletion attempts. 5. Monitor web server and application logs for unusual activity, especially POST requests to form endpoints and errors related to deserialization or file operations. 6. Employ runtime application self-protection (RASP) tools that can detect and block unsafe deserialization at runtime. 7. Conduct a thorough security audit of all WordPress plugins and remove or replace those that are unmaintained or vulnerable. 8. Educate site administrators on the risks of installing plugins from untrusted sources and the importance of timely updates. 9. Use intrusion detection systems (IDS) to alert on exploitation attempts targeting this vulnerability. 10. Regularly back up WordPress site files and databases to enable rapid recovery in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-09T09:44:00.490Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689c18f7ad5a09ad003e6af1
Added to database: 8/13/2025, 4:47:51 AM
Last enriched: 2/26/2026, 4:09:35 PM
Last updated: 3/24/2026, 5:09:10 PM
Views: 612
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.