CVE-2025-8420: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in emarket-design Request a Quote Form Plugin – Price Quote Request Management Made Easy
The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called.
AI Analysis
Technical Summary
CVE-2025-8420 is a high-severity remote code execution (RCE) vulnerability affecting the 'Request a Quote Form' plugin for WordPress developed by emarket-design, specifically versions up to and including 2.5.2. The vulnerability arises from improper input validation in the emd_form_builder_lite_pagenum function, where user-supplied input is used directly as a function name without adequate sanitization or neutralization. This constitutes an 'Eval Injection' (CWE-95) flaw, allowing unauthenticated attackers to invoke arbitrary functions on the server. Although the exploit does not permit passing parameters to these functions, the ability to call arbitrary functions can still lead to significant compromise, including executing malicious code, altering server behavior, or escalating privileges. The vulnerability is exploitable over the network without authentication or user interaction, but the attack complexity is rated high, likely due to the constraints on parameter passing and the need to identify callable functions that yield malicious outcomes. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The plugin is used for price quote request management in WordPress sites, which may be common in e-commerce and business service websites.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for businesses relying on WordPress-based e-commerce or service platforms that use the affected plugin. Successful exploitation could lead to full server compromise, data theft, defacement, or disruption of services, impacting customer trust and regulatory compliance, including GDPR mandates on data protection. The ability to execute arbitrary code remotely without authentication makes it a critical threat vector for cybercriminals targeting European SMEs and enterprises that often use WordPress plugins for business operations. The impact extends to potential lateral movement within networks, data exfiltration, and ransomware deployment. Given the high confidentiality, integrity, and availability impacts, organizations could face operational downtime, financial losses, and reputational damage.
Mitigation Recommendations
Immediate mitigation steps include: 1) Identifying and inventorying all WordPress installations using the 'Request a Quote Form' plugin, particularly versions ≤ 2.5.2. 2) Temporarily disabling or removing the plugin until a security patch is available. 3) Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the emd_form_builder_lite_pagenum function or unusual function invocation patterns. 4) Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN where feasible. 5) Monitoring server logs for anomalous function calls or unexpected behavior indicative of exploitation attempts. 6) Applying the patch promptly once released by the vendor. 7) Conducting a thorough security audit of WordPress environments to identify other potential injection points. 8) Employing runtime application self-protection (RASP) tools that can detect and prevent eval injection attacks dynamically. These measures go beyond generic advice by focusing on immediate containment, proactive detection, and environment hardening tailored to this specific eval injection vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-8420: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in emarket-design Request a Quote Form Plugin – Price Quote Request Management Made Easy
Description
The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called.
AI-Powered Analysis
Technical Analysis
CVE-2025-8420 is a high-severity remote code execution (RCE) vulnerability affecting the 'Request a Quote Form' plugin for WordPress developed by emarket-design, specifically versions up to and including 2.5.2. The vulnerability arises from improper input validation in the emd_form_builder_lite_pagenum function, where user-supplied input is used directly as a function name without adequate sanitization or neutralization. This constitutes an 'Eval Injection' (CWE-95) flaw, allowing unauthenticated attackers to invoke arbitrary functions on the server. Although the exploit does not permit passing parameters to these functions, the ability to call arbitrary functions can still lead to significant compromise, including executing malicious code, altering server behavior, or escalating privileges. The vulnerability is exploitable over the network without authentication or user interaction, but the attack complexity is rated high, likely due to the constraints on parameter passing and the need to identify callable functions that yield malicious outcomes. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The plugin is used for price quote request management in WordPress sites, which may be common in e-commerce and business service websites.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for businesses relying on WordPress-based e-commerce or service platforms that use the affected plugin. Successful exploitation could lead to full server compromise, data theft, defacement, or disruption of services, impacting customer trust and regulatory compliance, including GDPR mandates on data protection. The ability to execute arbitrary code remotely without authentication makes it a critical threat vector for cybercriminals targeting European SMEs and enterprises that often use WordPress plugins for business operations. The impact extends to potential lateral movement within networks, data exfiltration, and ransomware deployment. Given the high confidentiality, integrity, and availability impacts, organizations could face operational downtime, financial losses, and reputational damage.
Mitigation Recommendations
Immediate mitigation steps include: 1) Identifying and inventorying all WordPress installations using the 'Request a Quote Form' plugin, particularly versions ≤ 2.5.2. 2) Temporarily disabling or removing the plugin until a security patch is available. 3) Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the emd_form_builder_lite_pagenum function or unusual function invocation patterns. 4) Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN where feasible. 5) Monitoring server logs for anomalous function calls or unexpected behavior indicative of exploitation attempts. 6) Applying the patch promptly once released by the vendor. 7) Conducting a thorough security audit of WordPress environments to identify other potential injection points. 8) Employing runtime application self-protection (RASP) tools that can detect and prevent eval injection attacks dynamically. These measures go beyond generic advice by focusing on immediate containment, proactive detection, and environment hardening tailored to this specific eval injection vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-31T14:35:50.620Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6892c252ad5a09ad00edba4a
Added to database: 8/6/2025, 2:47:46 AM
Last enriched: 8/6/2025, 3:02:48 AM
Last updated: 1/7/2026, 4:22:24 AM
Views: 108
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.