CVE-2025-4665

WordPress · WordPress plugin Contact Form Multiple Products

A critical vulnerability has been identified in the WordPress plugin Contact Form CFDB7, affecting multiple products.

Executive summary

A critical vulnerability has been identified in the WordPress plugin Contact Form CFDB7, affecting multiple products. This flaw allows an unauthenticated attacker to take complete control of an affected website, leading to potential data theft, website defacement, or further compromise of the network infrastructure. Due to the high severity and ease of exploitation, immediate action is required.

Vulnerability

This is a pre-authentication vulnerability, meaning an attacker does not need valid user credentials to exploit it. The flaw begins with an SQL Injection vulnerability, allowing an attacker to send specially crafted data to a contact form that manipulates the website's database queries. This initial access is then leveraged to trigger a secondary vulnerability, Insecure Deserialization (also known as a PHP Object Injection), which can result in arbitrary code being executed on the server. This two-stage attack effectively gives a remote, unauthenticated attacker the ability to gain full administrative control over the WordPress site.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.6, posing a significant and immediate threat to the business. Successful exploitation could lead to a complete compromise of the affected website, resulting in the theft of sensitive data submitted through forms, such as customer personal identifiable information (PII). Further impacts include reputational damage from website defacement, loss of customer trust, and the potential for the compromised server to be used for malicious activities like hosting malware or launching attacks against other systems.

Remediation

Immediate Action: Immediately update the affected WordPress plugin to the latest patched version as recommended by the vendor. After patching, it is crucial to review web server access logs and database logs for any signs of exploitation attempts that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor web server logs for suspicious POST requests to form submission endpoints. Look for common SQL injection payloads (e.g., ', UNION, SELECT, sleep()) and patterns indicative of PHP object injection (e.g., O:[...]:{...}). Monitor for unexpected file modifications in the WordPress installation directory and any unusual outbound network traffic from the web server.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with strict rules designed to block SQL injection and PHP insecure deserialization attacks. As a temporary measure, consider disabling the vulnerable contact form plugin entirely until it can be safely updated. Restricting administrative access to the WordPress backend to trusted IP addresses can also limit an attacker's ability to maintain persistence post-exploitation.

Exploitation status

Public Exploit Available: False

Analyst recommendation

This vulnerability represents a critical risk and must be addressed with the highest priority. The combination of SQL Injection and PHP Object Injection allows for a reliable, unauthenticated remote code execution attack, which could lead to a complete system compromise. Although CVE-2025-4665 is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion. We strongly recommend all organizations using the affected plugin apply the required updates immediately without waiting for evidence of active exploitation.