{"uuid": "b1734bf4-a6ab-4e6b-ad0d-1a2798cfceff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1128", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5256", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1128\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Everest Forms \u2013 Contact Forms, Quiz, Survey, Newsletter &amp; Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the 'format' method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it possible for unauthenticated attackers to upload, read, and delete arbitrary files on the affected site's server which may make remote code execution, sensitive information disclosure, or a site takeover possible.\n\ud83d\udccf Published: 2025-02-25T06:58:31.380Z\n\ud83d\udccf Modified: 2025-02-25T06:58:31.380Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/8c04d8c9-acad-4832-aa8a-8372c58a0387?source=cve\n2. https://github.com/wpeverest/everest-forms/commit/7d37858d2c614aa107b0f495fe50819a3867e7f5\n3. https://plugins.trac.wordpress.org/changeset/3237831/everest-forms/trunk/includes/abstracts/class-evf-form-fields-upload.php#file0\n4. https://plugins.trac.wordpress.org/changeset/3243663/everest-forms#file7\n5. https://github.com/wpeverest/everest-forms/pull/1406/files", "creation_timestamp": "2025-02-25T07:22:35.000000Z"}