{"id":62337,"date":"2025-02-25T05:00:18","date_gmt":"2025-02-25T02:00:18","guid":{"rendered":"https:\/\/www.tenable.com\/cve\/CVE-2025-1128"},"modified":"2025-02-25T05:00:18","modified_gmt":"2025-02-25T02:00:18","slug":"cve-2025-1128","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2025-1128\/","title":{"rendered":"CVE-2025-1128"},"content":{"rendered":"<h4 class=\"border-bottom pb-1\">Description<\/h4>\n<p>The Everest Forms \u2013 Contact Forms, Quiz, Survey, Newsletter &amp; Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the \u2018format\u2019 method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it possible for unauthenticated attackers to upload, read, and delete arbitrary files on the affected site\u2019s server which may make remote code execution, sensitive information disclosure, or a site takeover possible.<\/p>\n<h4 class=\"border-bottom pb-1\">References<\/h4>\n<p><a target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.wordfence.com\/blog\/2025\/02\/100000-wordpress-sites-affected-by-arbitrary-file-upload-read-and-deletion-vulnerability-in-everest-forms-wordpress-plugin\/\">https:\/\/www.wordfence.com\/blog\/2025\/02\/100000-wordpress-sites-affected-by-arbitrary-file-upload-read-and-deletion-vulnerability-in-everest-forms-wordpress-plugin\/<\/a><\/p>\n<p>\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647 &#8211; \u0622\u0641\u0627\u0642 \u0647\u0627\u0633\u062a\u06cc\u0646\u06af<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description The Everest Forms \u2013 Contact Forms, Quiz, Survey, Newsletter &amp; Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the \u2018format\u2019 method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[663,236,661,662],"class_list":["post-62337","post","type-post","status-publish","format-standard","hentry","category-vulnerability","tag-cve","tag-236","tag-661","tag-662"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=62337"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62337\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=62337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=62337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=62337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}