{"uuid": "6ffa363e-323e-4031-ad36-cdc35e8690ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1128", "type": "seen", "source": "https://t.me/cvedetector/18859", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1128 - Everest Forms - WordPress Arbitrary File Upload and Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1128 \nPublished : Feb. 25, 2025, 7:15 a.m. | 2\u00a0hours, 23\u00a0minutes ago \nDescription : The Everest Forms \u2013 Contact Forms, Quiz, Survey, Newsletter &amp; Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the 'format' method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it possible for unauthenticated attackers to upload, read, and delete arbitrary files on the affected site's server which may make remote code execution, sensitive information disclosure, or a site takeover possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T10:41:15.000000Z"}