Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7696: CWE-502 Deserialization of Untrusted Data in crmperks Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms

0
Critical
VulnerabilityCVE-2025-7696cvecve-2025-7696cwe-502
Published: Sat Jul 19 2025 (07/19/2025, 04:23:02 UTC)
Source: CVE Database V5
Vendor/Project: crmperks
Product: Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms

Description

The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:30:17 UTC

Technical Analysis

CVE-2025-7696 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting the crmperks Integration plugin for Pipedrive and popular WordPress form plugins including Contact Form 7, WPForms, Elementor, and Ninja Forms. The vulnerability exists in all versions up to 1.2.3 due to unsafe deserialization in the verify_field_val() function, which processes untrusted input without proper validation or sanitization. This flaw enables unauthenticated attackers to perform PHP Object Injection, a technique where crafted serialized objects are injected and deserialized, allowing execution of arbitrary code paths. The presence of a Property Oriented Programming (POP) gadget chain in the Contact Form 7 plugin facilitates exploitation by enabling attackers to delete arbitrary files on the server. Deletion of critical files like wp-config.php can lead to denial of service by breaking the WordPress installation or even remote code execution if attackers leverage the altered state. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects its critical nature, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the combination of widespread plugin usage and the severity of the flaw demands urgent attention from site administrators and developers.

Potential Impact

The impact of CVE-2025-7696 is severe for organizations worldwide that use WordPress sites with the affected crmperks Integration plugin and associated form plugins. Successful exploitation can lead to complete compromise of the affected website, including unauthorized deletion of critical configuration files like wp-config.php, resulting in site downtime (denial of service) and potential remote code execution. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications or deletions, and availability by disrupting service. Attackers can gain persistent footholds, pivot within the hosting environment, or use compromised sites as launchpads for further attacks. Given the popularity of WordPress and the widespread use of these plugins, the threat surface is large, affecting small businesses, enterprises, and government websites alike. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the likelihood of automated attacks and mass exploitation campaigns once public exploits emerge.

Mitigation Recommendations

To mitigate CVE-2025-7696, organizations should immediately audit their WordPress installations for the presence of the crmperks Integration plugin and the specified form plugins (Contact Form 7, WPForms, Elementor, Ninja Forms). Until an official patch is released, consider disabling or removing the vulnerable plugin to eliminate the attack vector. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads or unusual POST requests targeting the verify_field_val() function. Restrict file system permissions to prevent unauthorized deletion or modification of critical files like wp-config.php, ensuring the web server user has minimal necessary privileges. Monitor logs for anomalous activity indicative of exploitation attempts, such as unexpected file deletions or serialized data in requests. Once patches are available, apply them promptly and verify plugin integrity. Additionally, implement defense-in-depth strategies including regular backups, intrusion detection systems, and network segmentation to limit damage from potential breaches. Educate development teams on secure coding practices to avoid unsafe deserialization in future plugin development.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-15T22:02:28.714Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687b1f8ea83201eaacf9c48e

Added to database: 7/19/2025, 4:31:10 AM

Last enriched: 2/26/2026, 4:30:17 PM

Last updated: 3/26/2026, 11:30:34 AM

Views: 154

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses