CVE-2025-1128
WordPress vulnerability analysis and mitigation

Overview

A severe security vulnerability (CVE-2025-1128) was discovered in the Everest Forms WordPress plugin versions up to 3.0.9.4. The vulnerability, rated with a critical CVSS score of 9.8, affects over 100,000 WordPress websites. The flaw was discovered by security researcher Arkadiusz Hydzik through Wordfence's Bug Bounty Program and was patched in version 3.0.9.5, released on February 20, 2025 (Security Online).

Technical details

The vulnerability exists in the format() method of the EVFFormFields_Upload class, where missing file type and path validation allows attackers to upload arbitrary files. The flaw stems from improper sanitization of file parameters and lack of file type validation checks, enabling attackers to upload malicious PHP scripts disguised as harmless files like .csv or .txt. The vulnerability received a CVSS score of 9.8 due to its critical nature and ease of exploitation (Security Online).

Impact

The vulnerability allows unauthenticated attackers to upload, read, and delete arbitrary files on affected WordPress sites' servers. Attackers can upload malicious PHP code to the WordPress uploads folder, which is publicly accessible, enabling remote code execution. Additionally, attackers can delete critical files like wp-config.php, forcing the site into a setup state and potentially allowing complete site takeover (Security Online).

Mitigation and workarounds

Site owners are strongly advised to update to Everest Forms version 3.0.9.5 immediately. Additional security measures include implementing a Web Application Firewall (WAF), monitoring server logs for suspicious file uploads or access attempts, and reviewing file permissions to prevent unauthorized access. The patch includes additional validation checks and proper sanitization of file parameters (Security Online).

Community reactions

The vulnerability discovery earned the researcher a $4,290.00 bounty through Wordfence's Bug Bounty Program. The security community has emphasized the severity of this vulnerability due to its potential for complete site takeover and the large number of affected websites (Security Online).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management