CVE-2025-8145

WordPress · WordPress "Redirection for Contact Form 7" plugin

A high-severity vulnerability has been identified in the "Redirection for Contact Form 7" plugin for WordPress.

Executive summary

A high-severity vulnerability has been identified in the "Redirection for Contact Form 7" plugin for WordPress. This flaw, known as a PHP Object Injection, could allow an unauthenticated attacker to inject and execute malicious code, potentially leading to a complete compromise of the affected website. A successful attack could result in data theft, website defacement, or the server being used for further malicious activities.

Vulnerability

The vulnerability is a PHP Object Injection flaw. It exists because the plugin improperly handles user-supplied data before passing it to the unserialize() PHP function. An unauthenticated attacker can craft a malicious serialized PHP object and submit it to the application. When the vulnerable plugin deserializes this payload, it can trigger a "Property-Oriented Programming" (POP) chain, allowing the attacker to execute arbitrary code, manipulate files, or interact with the database in the context of the web server's user permissions.

Business impact

This is a high-severity vulnerability with a CVSS score of 8.8. Successful exploitation could grant an attacker full administrative control over the WordPress site, leading to significant business disruption. Potential consequences include the theft of sensitive data such as customer information or user credentials, website defacement causing reputational damage, and the installation of backdoors for persistent access. Furthermore, a compromised server could be used to launch attacks against other systems, creating additional legal and financial liabilities for the organization.

Remediation

Immediate Action: Immediately update the "Redirection for Contact Form 7" plugin to the latest patched version released by the vendor. If the plugin is not critical to business operations, consider deactivating and removing it entirely to eliminate the attack surface.

Proactive Monitoring: Monitor web server access logs for unusual POST requests containing long, encoded strings which may indicate serialized object payloads. Review application error logs for warnings or errors related to the unserialize() function. Implement file integrity monitoring to detect unauthorized changes to plugin files or the creation of suspicious PHP files in web-accessible directories.

Compensating Controls: If immediate patching is not possible, deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block PHP Object Injection attack patterns. Ensure the web server process runs with the minimum permissions necessary (principle of least privilege) to limit the potential impact of a successful exploit.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Immediate patching is strongly recommended for all systems utilizing the affected "Redirection for Contact Form 7" plugin. The high severity rating (CVSS 8.8) signifies a critical risk of remote code execution and complete system compromise. While this vulnerability is not yet on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high-impact nature makes it a prime target for future exploitation. Organizations must prioritize the remediation actions outlined in this report to prevent the potential compromise of their web infrastructure and sensitive data.