CVE-2025-8289
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-20

Last updated on: 2025-08-20

Assigner: Wordfence

Description
The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the delete_associated_files function. This makes it possible for unauthenticated attackers to inject a PHP Object. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with a file upload action, and doesn't affect sites with PHP version > 8. This vulnerability also requires the 'Redirection For Contact Form 7 Extension - Create Post' extension to be installed and activated in order to be exploited. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. We confirmed there is a usable gadget in Contact Form 7 plugin that makes arbitrary file deletion possible when installed with this plugin. Given Contact Form 7 is a requirement of this plugin, it is likely that any site with this plugin and the 'Redirection For Contact Form 7 Extension - Create Post' extension enabled is vulnerable to arbitrary file deletion.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-20
Last Modified
2025-08-20
Generated
2026-05-07
AI Q&A
2025-08-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordpress contact_form_7 *
wordpress wpcf7-redirect 3.2.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Redirection for Contact Form 7 plugin for WordPress (up to version 3.2.4) and involves PHP Object Injection via deserialization of untrusted input in the delete_associated_files function. It allows unauthenticated attackers to inject a PHP object if a form with a file upload action is present and the 'Redirection For Contact Form 7 Extension - Create Post' extension is installed and activated. The vulnerability requires a PHP version of 8 or lower and the presence of a POP chain in another plugin or theme to be exploitable. If exploitable, it can lead to arbitrary file deletion, retrieval of sensitive data, or code execution depending on the POP chain available.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to delete arbitrary files, retrieve sensitive data, or execute code on the affected WordPress site. This can lead to data loss, unauthorized access to sensitive information, and potential full compromise of the website.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update or remove the Redirection for Contact Form 7 plugin if it is at version 3.2.4 or below. Also, ensure that the 'Redirection For Contact Form 7 Extension - Create Post' extension is not installed or activated if not necessary. Additionally, verify that your PHP version is greater than 8, as the vulnerability does not affect PHP versions above 8. Finally, review installed plugins and themes for any potential POP chains that could be exploited in conjunction with this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart