{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:11:15.021","vulnerabilities":[{"cve":{"id":"CVE-2025-1128","sourceIdentifier":"security@wordfence.com","published":"2025-02-25T07:15:18.480","lastModified":"2025-02-28T15:59:40.317","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Everest Forms – Contact Forms, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the 'format' method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it possible for unauthenticated attackers to upload, read, and delete arbitrary files on the affected site's server which may make remote code execution, sensitive information disclosure, or a site takeover possible."},{"lang":"es","value":"El complemento Everest Forms – Contact Forms, Quiz, Survey, Newsletter &amp; Payment Form Builder para WordPress es vulnerable a la carga, lectura y eliminación de archivos arbitrarios debido a la falta de validación de tipo y ruta de archivo en el método 'format' de la clase EVF_Form_Fields_Upload en todas las versiones hasta la 3.0.9.4 incluida. Esto hace posible que atacantes no autenticados carguen, lean y eliminen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código, la divulgación de información confidencial o la toma de control del sitio."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wpeverest:everest_forms:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.0.9.5","matchCriteriaId":"B712653D-F559-40E4-818F-C6F329618214"}]}]}],"references":[{"url":"https://github.com/wpeverest/everest-forms/commit/7d37858d2c614aa107b0f495fe50819a3867e7f5","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://github.com/wpeverest/everest-forms/pull/1406/files","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://plugins.trac.wordpress.org/changeset/3237831/everest-forms/trunk/includes/abstracts/class-evf-form-fields-upload.php#file0","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://plugins.trac.wordpress.org/changeset/3243663/everest-forms#file7","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/8c04d8c9-acad-4832-aa8a-8372c58a0387?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}