CVE-2025-6463
WordPress vulnerability analysis and mitigation

Overview

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress contains a critical vulnerability (CVE-2025-6463) affecting versions up to and including 1.44.2. The vulnerability was discovered in July 2025 and allows unauthenticated attackers to perform arbitrary file deletion due to insufficient file path validation in the 'entrydeleteupload_files' function. This vulnerability impacts over 600,000 active WordPress installations (SecurityOnline, NVD).

Technical details

The vulnerability exists in the form submission deletion process where attackers can specify arbitrary file paths. When a form submission is deleted, either manually by an administrator or automatically through plugin settings, the referenced files are also deleted without proper validation. The vulnerability has been assigned a CVSS score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can lead to remote code execution if critical files like wp-config.php are deleted. When wp-config.php is deleted, the site enters a setup state, allowing attackers to initiate a site takeover by connecting it to a database under their control. The vulnerability affects over 600,000 WordPress websites and requires no authentication to exploit (SecurityOnline).

Mitigation and workarounds

The vulnerability has been patched in version 1.44.3. Site administrators are strongly advised to immediately update to this version or later. Additional recommended security measures include reviewing auto-deletion and spam filtering settings in the plugin, monitoring for suspicious form submissions, and enabling Web Application Firewall (WAF) protection (SecurityOnline).

Community reactions

The vulnerability was responsibly reported by security researcher Phat RiO – BlueRock through the Wordfence Bug Bounty Program, earning a bounty of $8,100 for the discovery (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management