Skip to main content

CVE-2025-7384: CWE-502 Deserialization of Untrusted Data in crmperks Database for Contact Form 7, WPforms, Elementor forms

Critical
VulnerabilityCVE-2025-7384cvecve-2025-7384cwe-502
Published: Wed Aug 13 2025 (08/13/2025, 04:22:56 UTC)
Source: CVE Database V5
Vendor/Project: crmperks
Product: Database for Contact Form 7, WPforms, Elementor forms

Description

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.

AI-Powered Analysis

AILast updated: 08/13/2025, 05:02:46 UTC

Technical Analysis

CVE-2025-7384 is a critical vulnerability affecting the 'Database for Contact Form 7, WPforms, Elementor forms' plugin for WordPress, specifically all versions up to and including 1.4.3. The vulnerability arises from unsafe deserialization of untrusted input in the get_lead_detail function, which allows unauthenticated attackers to perform PHP Object Injection (CWE-502). This type of vulnerability occurs when user-supplied data is deserialized without proper validation, enabling attackers to inject malicious PHP objects. The presence of a Property Oriented Programming (POP) chain in the Contact Form 7 plugin, which is commonly used alongside the vulnerable plugin, exacerbates the risk. This POP chain can be leveraged to delete arbitrary files on the server, including critical configuration files such as wp-config.php. The deletion of wp-config.php can lead to denial of service (DoS) by breaking the WordPress installation or potentially remote code execution (RCE) if attackers can manipulate the environment post-deletion. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it highly dangerous. The CVSS v3.1 score of 9.8 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. No patches have been released at the time of this report, and no known exploits are currently observed in the wild, though the risk remains significant due to the ease of exploitation and the widespread use of the affected plugins.

Potential Impact

For European organizations, this vulnerability poses a severe threat, especially for those relying on WordPress websites with the affected plugins installed. The exploitation can lead to complete compromise of the website, data breaches involving sensitive customer information collected via contact forms, and disruption of business operations due to site downtime. The ability to delete wp-config.php can cause service outages, impacting customer trust and potentially violating data protection regulations such as GDPR if personal data is exposed or lost. Furthermore, successful remote code execution could allow attackers to pivot into internal networks, escalate privileges, or deploy malware, increasing the risk of broader organizational compromise. Given the popularity of WordPress and these plugins among small and medium enterprises, e-commerce sites, and public sector websites in Europe, the potential impact is widespread and critical.

Mitigation Recommendations

Immediate mitigation steps include: 1) Temporarily disabling the affected plugins until a security patch is released. 2) Implementing Web Application Firewall (WAF) rules to detect and block suspicious deserialization payloads targeting the get_lead_detail function. 3) Restricting file system permissions to prevent unauthorized deletion of critical files like wp-config.php, limiting the impact of exploitation. 4) Monitoring web server and application logs for unusual POST requests or error messages related to deserialization. 5) Applying principle of least privilege on the web server user to minimize damage if exploitation occurs. 6) Keeping WordPress core and all plugins updated and subscribing to vendor security advisories for timely patching once available. 7) Conducting security audits and penetration testing focused on deserialization vulnerabilities and PHP Object Injection vectors. These measures go beyond generic advice by focusing on immediate containment, detection, and minimizing exploitation impact while awaiting official patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-09T09:44:00.490Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689c18f7ad5a09ad003e6af1

Added to database: 8/13/2025, 4:47:51 AM

Last enriched: 8/13/2025, 5:02:46 AM

Last updated: 8/13/2025, 3:19:11 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats