CVE-2025-7638: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to time-based SQL Injection via the `order_by` parameter in all versions up to, and including, 1.45.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI Analysis
Technical Summary
CVE-2025-7638 is a medium-severity SQL Injection vulnerability affecting the WordPress plugin 'Forminator Forms – Contact Form, Payment Form & Custom Form Builder' developed by wpmudev. This vulnerability exists in all versions up to and including 1.45.0. The root cause is improper neutralization of special elements used in SQL commands (CWE-89), specifically via the 'order_by' parameter. The plugin fails to properly escape or prepare the user-supplied 'order_by' parameter before incorporating it into SQL queries. As a result, authenticated users with Administrator-level privileges or higher can inject additional SQL commands into existing queries. This injection is time-based, meaning attackers can infer data by measuring response delays, allowing them to extract sensitive information from the database without direct error messages or visible output. The vulnerability does not require user interaction beyond authentication, and the attacker must have high privileges, which limits the attack surface but still poses a significant risk if an administrator account is compromised or malicious. The CVSS v3.1 score is 4.9 (medium), reflecting the network attack vector, low attack complexity, requirement for high privileges, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches are linked yet. The vulnerability was publicly disclosed on July 18, 2025.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites and services using WordPress with the Forminator Forms plugin installed and active. Since the vulnerability requires administrator-level access, the primary impact vector is through compromised or malicious admin accounts. Successful exploitation can lead to unauthorized disclosure of sensitive data stored in the WordPress database, including user information, payment details, or other confidential content managed via the forms. This can result in data breaches violating GDPR and other data protection regulations, leading to legal penalties and reputational damage. Additionally, the extraction of sensitive data could facilitate further attacks such as identity theft, fraud, or lateral movement within the organization's network. Given the widespread use of WordPress in Europe, especially among SMEs and public sector entities, the vulnerability could affect a broad range of organizations if they have not updated or mitigated the risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor and audit administrator account activities for unusual behavior that might indicate exploitation attempts. 3) If possible, temporarily disable or remove the Forminator Forms plugin until a patched version is released. 4) Implement Web Application Firewall (WAF) rules that detect and block suspicious SQL injection patterns targeting the 'order_by' parameter, including time-based injection attempts. 5) Conduct thorough security reviews and penetration testing focused on WordPress plugins, especially those handling user input in SQL queries. 6) Keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories to apply patches promptly once available. 7) Limit database user privileges used by WordPress to the minimum necessary to reduce potential data exposure in case of injection.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7638: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpmudev Forminator Forms – Contact Form, Payment Form & Custom Form Builder
Description
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to time-based SQL Injection via the `order_by` parameter in all versions up to, and including, 1.45.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
AI-Powered Analysis
Technical Analysis
CVE-2025-7638 is a medium-severity SQL Injection vulnerability affecting the WordPress plugin 'Forminator Forms – Contact Form, Payment Form & Custom Form Builder' developed by wpmudev. This vulnerability exists in all versions up to and including 1.45.0. The root cause is improper neutralization of special elements used in SQL commands (CWE-89), specifically via the 'order_by' parameter. The plugin fails to properly escape or prepare the user-supplied 'order_by' parameter before incorporating it into SQL queries. As a result, authenticated users with Administrator-level privileges or higher can inject additional SQL commands into existing queries. This injection is time-based, meaning attackers can infer data by measuring response delays, allowing them to extract sensitive information from the database without direct error messages or visible output. The vulnerability does not require user interaction beyond authentication, and the attacker must have high privileges, which limits the attack surface but still poses a significant risk if an administrator account is compromised or malicious. The CVSS v3.1 score is 4.9 (medium), reflecting the network attack vector, low attack complexity, requirement for high privileges, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches are linked yet. The vulnerability was publicly disclosed on July 18, 2025.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites and services using WordPress with the Forminator Forms plugin installed and active. Since the vulnerability requires administrator-level access, the primary impact vector is through compromised or malicious admin accounts. Successful exploitation can lead to unauthorized disclosure of sensitive data stored in the WordPress database, including user information, payment details, or other confidential content managed via the forms. This can result in data breaches violating GDPR and other data protection regulations, leading to legal penalties and reputational damage. Additionally, the extraction of sensitive data could facilitate further attacks such as identity theft, fraud, or lateral movement within the organization's network. Given the widespread use of WordPress in Europe, especially among SMEs and public sector entities, the vulnerability could affect a broad range of organizations if they have not updated or mitigated the risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor and audit administrator account activities for unusual behavior that might indicate exploitation attempts. 3) If possible, temporarily disable or remove the Forminator Forms plugin until a patched version is released. 4) Implement Web Application Firewall (WAF) rules that detect and block suspicious SQL injection patterns targeting the 'order_by' parameter, including time-based injection attempts. 5) Conduct thorough security reviews and penetration testing focused on WordPress plugins, especially those handling user input in SQL queries. 6) Keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories to apply patches promptly once available. 7) Limit database user privileges used by WordPress to the minimum necessary to reduce potential data exposure in case of injection.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-14T14:04:02.345Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6879ce10a83201eaaceef2aa
Added to database: 7/18/2025, 4:31:12 AM
Last enriched: 7/18/2025, 4:47:13 AM
Last updated: 7/18/2025, 4:47:13 AM
Views: 2
Related Threats
CVE-2025-7643: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aaroncampbell Attachment Manager
CriticalCVE-2025-6726: CWE-862 Missing Authorization in krasenslavov Block Editor Gallery Slider
MediumCVE-2025-6719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in vladimirs Terms descriptions
MediumCVE-2025-6718: CWE-862 Missing Authorization in b1accounting B1.lt
HighCVE-2025-6717: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in b1accounting B1.lt
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.