
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A severe security vulnerability (CVE-2025-1128) was discovered in the Everest Forms WordPress plugin versions up to 3.0.9.4. The vulnerability, rated with a critical CVSS score of 9.8, affects over 100,000 WordPress websites. The flaw was discovered by security researcher Arkadiusz Hydzik through Wordfence's Bug Bounty Program and was patched in version 3.0.9.5, released on February 20, 2025 (Security Online).
The vulnerability exists in the format() method of the EVFFormFields_Upload class, where missing file type and path validation allows attackers to upload arbitrary files. The flaw stems from improper sanitization of file parameters and lack of file type validation checks, enabling attackers to upload malicious PHP scripts disguised as harmless files like .csv or .txt. The vulnerability received a CVSS score of 9.8 due to its critical nature and ease of exploitation (Security Online).
The vulnerability allows unauthenticated attackers to upload, read, and delete arbitrary files on affected WordPress sites' servers. Attackers can upload malicious PHP code to the WordPress uploads folder, which is publicly accessible, enabling remote code execution. Additionally, attackers can delete critical files like wp-config.php, forcing the site into a setup state and potentially allowing complete site takeover (Security Online).
Site owners are strongly advised to update to Everest Forms version 3.0.9.5 immediately. Additional security measures include implementing a Web Application Firewall (WAF), monitoring server logs for suspicious file uploads or access attempts, and reviewing file permissions to prevent unauthorized access. The patch includes additional validation checks and proper sanitization of file parameters (Security Online).
The vulnerability discovery earned the researcher a $4,290.00 bounty through Wordfence's Bug Bounty Program. The security community has emphasized the severity of this vulnerability due to its potential for complete site takeover and the large number of affected websites (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”