CVE-2025-8145: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the get_lead_fields function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in a Contact Form 7 plugin allows attackers to delete arbitrary files. Additionally, in certain server configurations, Remote Code Execution is possible
AI Analysis
Technical Summary
CVE-2025-8145 is a high-severity vulnerability affecting the 'Redirection for Contact Form 7' WordPress plugin developed by themeisle. This vulnerability arises from unsafe deserialization of untrusted data in the get_lead_fields function, which allows unauthenticated attackers to perform PHP Object Injection (CWE-502). The plugin versions up to and including 3.2.4 are affected, with no version exclusions specified, indicating all versions are vulnerable. The exploitation chain involves injecting a crafted PHP object that, due to the presence of a gadget chain (POP chain) in the Contact Form 7 plugin, can lead to arbitrary file deletion on the server. Furthermore, under certain server configurations, this vulnerability escalates to Remote Code Execution (RCE), enabling attackers to execute arbitrary code remotely without authentication. The CVSS v3.1 base score of 8.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are reported in the wild yet, but the technical details and the severity indicate a significant risk for WordPress sites using this plugin. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a substantial threat, especially for those relying on WordPress websites with the Redirection for Contact Form 7 plugin installed. Exploitation could lead to unauthorized disclosure of sensitive data (confidentiality breach), modification or deletion of critical files (integrity breach), and disruption of website availability through file deletion or remote code execution. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), financial losses, and operational downtime. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for public-facing sites or customer interaction portals, are particularly at risk. The unauthenticated nature of the attack vector means that attackers can exploit the vulnerability remotely without credentials, increasing the attack surface. The requirement for user interaction (UI:R) suggests that some form of user engagement, such as submitting a crafted form, is necessary, which may be feasible in many web environments. The potential for remote code execution under certain server configurations elevates the risk to critical levels, as attackers could gain full control over affected servers, leading to further lateral movement and persistent compromise.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the 'Redirection for Contact Form 7' plugin until a secure patch is released. 2. Monitor official themeisle and WordPress plugin repositories for updates or patches addressing CVE-2025-8145 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious deserialization payloads and PHP object injection attempts targeting the plugin's endpoints. 4. Restrict file system permissions to limit the ability of the web server process to delete or modify critical files, thereby reducing the impact of arbitrary file deletion. 5. Harden server configurations to prevent remote code execution, such as disabling dangerous PHP functions (e.g., eval, system, exec), enabling PHP open_basedir restrictions, and employing security modules like mod_security. 6. Conduct regular security audits and penetration testing focusing on deserialization vulnerabilities and plugin security. 7. Educate site administrators and users about the risks of interacting with untrusted inputs and the importance of cautious handling of form submissions. 8. Maintain comprehensive backups of website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-8145: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
Description
The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the get_lead_fields function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in a Contact Form 7 plugin allows attackers to delete arbitrary files. Additionally, in certain server configurations, Remote Code Execution is possible
AI-Powered Analysis
Technical Analysis
CVE-2025-8145 is a high-severity vulnerability affecting the 'Redirection for Contact Form 7' WordPress plugin developed by themeisle. This vulnerability arises from unsafe deserialization of untrusted data in the get_lead_fields function, which allows unauthenticated attackers to perform PHP Object Injection (CWE-502). The plugin versions up to and including 3.2.4 are affected, with no version exclusions specified, indicating all versions are vulnerable. The exploitation chain involves injecting a crafted PHP object that, due to the presence of a gadget chain (POP chain) in the Contact Form 7 plugin, can lead to arbitrary file deletion on the server. Furthermore, under certain server configurations, this vulnerability escalates to Remote Code Execution (RCE), enabling attackers to execute arbitrary code remotely without authentication. The CVSS v3.1 base score of 8.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are reported in the wild yet, but the technical details and the severity indicate a significant risk for WordPress sites using this plugin. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a substantial threat, especially for those relying on WordPress websites with the Redirection for Contact Form 7 plugin installed. Exploitation could lead to unauthorized disclosure of sensitive data (confidentiality breach), modification or deletion of critical files (integrity breach), and disruption of website availability through file deletion or remote code execution. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), financial losses, and operational downtime. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for public-facing sites or customer interaction portals, are particularly at risk. The unauthenticated nature of the attack vector means that attackers can exploit the vulnerability remotely without credentials, increasing the attack surface. The requirement for user interaction (UI:R) suggests that some form of user engagement, such as submitting a crafted form, is necessary, which may be feasible in many web environments. The potential for remote code execution under certain server configurations elevates the risk to critical levels, as attackers could gain full control over affected servers, leading to further lateral movement and persistent compromise.
Mitigation Recommendations
1. Immediate mitigation should include disabling or removing the 'Redirection for Contact Form 7' plugin until a secure patch is released. 2. Monitor official themeisle and WordPress plugin repositories for updates or patches addressing CVE-2025-8145 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious deserialization payloads and PHP object injection attempts targeting the plugin's endpoints. 4. Restrict file system permissions to limit the ability of the web server process to delete or modify critical files, thereby reducing the impact of arbitrary file deletion. 5. Harden server configurations to prevent remote code execution, such as disabling dangerous PHP functions (e.g., eval, system, exec), enabling PHP open_basedir restrictions, and employing security modules like mod_security. 6. Conduct regular security audits and penetration testing focusing on deserialization vulnerabilities and plugin security. 7. Educate site administrators and users about the risks of interacting with untrusted inputs and the importance of cautious handling of form submissions. 8. Maintain comprehensive backups of website data and configurations to enable rapid recovery in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-24T19:08:42.997Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a533d0ad5a09ad00ff4066
Added to database: 8/20/2025, 2:32:48 AM
Last enriched: 8/20/2025, 2:48:02 AM
Last updated: 10/3/2025, 6:13:03 AM
Views: 54
Related Threats
CVE-2025-9952: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-9886: CWE-352 Cross-Site Request Forgery (CSRF) in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-10383: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-61895
LowCVE-2025-61894
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.