The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Aug 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Crmperks
Crmperks database For Contact Form 7, Wpforms, Elementor Forms Wordpress Wordpress wordpress |
|
Vendors & Products |
Crmperks
Crmperks database For Contact Form 7, Wpforms, Elementor Forms Wordpress Wordpress wordpress |
Wed, 13 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted. | |
Title | Database for Contact Form 7, WPforms, Elementor forms <= 1.4.3 - Unauthenticated PHP Object Injection to Arbitrary File Deletion | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-13T04:22:56.944Z
Updated: 2025-08-13T13:50:48.521Z
Reserved: 2025-07-09T09:44:00.490Z
Link: CVE-2025-7384

Updated: 2025-08-13T13:50:46.140Z

Status : Awaiting Analysis
Published: 2025-08-13T05:15:26.530
Modified: 2025-08-13T17:33:46.673
Link: CVE-2025-7384

No data.