CVE-2025-6463

WordPress · WordPress Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin

**A high-severity arbitrary file deletion vulnerability in the Forminator Forms plugin for WordPress allows an authenticated attacker to delete critical system files, potentially leading to a complete.

Executive summary

A high-severity arbitrary file deletion vulnerability in the Forminator Forms plugin for WordPress allows an authenticated attacker to delete critical system files, potentially leading to a complete denial of service.

Vulnerability

The vulnerability exists due to insufficient file path validation within the 'entry_delete_upload_files' function. An authenticated attacker can exploit this flaw to delete arbitrary files on the server's filesystem, including critical application or system configuration files.

Business impact

The assigned CVSS score of 8.8 (High) reflects the critical impact of this vulnerability. A successful exploit could result in a complete denial of service for the affected website by deleting core WordPress files, leading to significant operational disruption and potential reputational damage. This flaw represents a severe integrity and availability risk to the web application and underlying server.

Remediation

Immediate Action: Administrators must immediately update the Forminator Forms plugin to the latest patched version as specified by the vendor. If an update cannot be applied, disabling the plugin is a required temporary mitigation.

Proactive Monitoring: Monitor web server and application logs for unusual file deletion activities or errors related to missing WordPress core files. File integrity monitoring (FIM) systems should be configured to alert on unauthorized changes within the web root directory.

Compensating Controls: Implement a Web Application Firewall (WAF) with rules that block directory traversal payloads and restrict access to sensitive administrative functions from untrusted sources.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) and the potential for complete system unavailability, this vulnerability requires immediate attention. We strongly recommend prioritizing the deployment of the vendor-supplied patch across all affected WordPress instances. Prompt remediation is critical to prevent exploitation and safeguard site integrity and availability.