CVE-2025-5927
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-25

Last updated on: 2025-07-08

Assigner: Wordfence

Description
The Everest Forms (Pro) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_entry_files() function in all versions up to, and including, 1.9.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability requires an admin to trigger the deletion via deletion of a form entry and cannot be carried out by the attacker alone.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-25
Last Modified
2025-07-08
Generated
2026-05-07
AI Q&A
2025-06-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wpeverest everest_forms to 1.9.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-36 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-5927 is a vulnerability in the Everest Forms (Pro) WordPress plugin that allows unauthenticated attackers to delete arbitrary files on the server due to insufficient file path validation in the delete_entry_files() function. Although the attacker cannot trigger the deletion alone, if an admin deletes a form entry, the attacker can exploit this to delete critical files like wp-config.php, potentially leading to remote code execution.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized deletion of important server files, which can lead to remote code execution. This means an attacker could gain control over the server, compromise website integrity, steal data, or disrupt services. The risk is heightened because critical files such as wp-config.php can be deleted, enabling further exploitation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for unauthorized or suspicious deletion of files on the server, especially critical WordPress files like wp-config.php. Since the vulnerability requires an admin to trigger deletion via form entry deletion, reviewing logs for deletion actions related to Everest Forms entries can help. Additionally, checking for unexpected missing files or changes in file system integrity may indicate exploitation. Specific commands could include: 1) Using WordPress or server logs to identify deletion events related to Everest Forms entries. 2) Running file integrity checks with tools like 'diff' or 'tripwire' to detect unexpected file deletions. 3) Searching web server access logs for suspicious POST requests to endpoints handling form entry deletions. However, no explicit commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Everest Forms plugin to a version later than 1.9.4 where the vulnerability is fixed, as indicated by multiple security patches in versions 3.0.9 and later. Additionally, restrict admin access to trusted users only, monitor and audit form entry deletions, and implement file system permissions to limit the ability of the web server to delete critical files. Applying all available security updates and reviewing user roles and permissions within the plugin to prevent unauthorized deletion actions are also recommended. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart