Deserialization of Untrusted Data vulnerability in magepeopleteam Booking and Rental Manager booking-and-rental-manager-for-woocommerce allows Object...
Description
Deserialization of Untrusted Data vulnerability in magepeopleteam Booking and Rental Manager booking-and-rental-manager-for-woocommerce allows Object Injection
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability has been identified in the "WordPress Contact Form 7 PDF, Google Sheet & Database" plugin, which allows unauthenticated attackers to upload malicious files to a website's server. Successful exploitation could lead to a complete compromise of the affected website, enabling attackers to steal data, deface the site, or use the server for further malicious activities. Due to the high severity (CVSS 9.8), immediate remediation is strongly recommended to prevent a potential breach.
Vulnerability Details
CVE-ID: CVE-2025-64231
Affected Software: RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database
Affected Versions: All versions up to and including 3.0.0
Vulnerability: The vulnerability is an "Unrestricted Upload of File with Dangerous Type." The plugin fails to properly validate the types of files being uploaded through the contact form functionality. An unauthenticated attacker can craft a malicious file, such as a PHP web shell, and upload it disguised as a legitimate file type. Once the file is on the server, the attacker can navigate to its location via a URL to execute the embedded code, granting them remote code execution capabilities within the security context of the web server.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. A successful exploit would result in a complete compromise of the web server hosting the WordPress site. The potential business impact includes, but is not limited to, theft of sensitive data (customer information, PII, payment details), significant reputational damage from website defacement, loss of customer trust, and the potential for the compromised server to be used as a pivot point for further attacks against the internal network or to host malware for distribution. Financial costs associated with incident response, cleanup, and potential regulatory fines can be substantial.
Remediation Plan
Immediate Action: Immediately update the "WordPress Contact Form 7 PDF, Google Sheet & Database" plugin to the latest version available from the vendor, which should be a version greater than 3.0.0. After patching, review web server access logs and the file system for any indicators of compromise, such as suspicious file uploads or unusual web requests, that may have occurred prior to the update.
Proactive Monitoring: Monitor web server logs for POST requests to form submission endpoints followed by GET requests to files in the WordPress uploads directory, particularly for files with executable extensions (e.g., .php, .phtml, .php5). Implement file integrity monitoring (FIM) on the web server to generate alerts for any new or modified files in web-accessible directories. Monitor for unusual outbound network traffic originating from the web server, which could indicate a web shell communicating with a command-and-control server.
Compensating Controls: If immediate patching is not feasible, consider the following mitigating actions:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of December 18, 2025, there are no known public proof-of-concept exploits for this vulnerability. However, unrestricted file upload vulnerabilities are trivial to exploit, and it is highly likely that threat actors will develop exploits rapidly. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the low complexity of exploitation, we strongly recommend that organizations treat this vulnerability with the highest priority. All instances of the affected plugin must be updated to a patched version immediately. Due to the risk of pre-patch compromise, security teams should proactively hunt for indicators of compromise on all servers running this plugin. Do not wait for public exploit code to become available or for this CVE to be added to the CISA KEV catalog before taking action, as exploitation is likely to precede widespread public disclosure.