CVE-2026-3296
Everest Forms · Everest Forms
The Everest Forms WordPress plugin is vulnerable to PHP Object Injection via unsafe deserialization of user-supplied form metadata.
Executive summary
An unauthenticated PHP Object Injection vulnerability in Everest Forms allows remote attackers to execute arbitrary code on the host server.
Vulnerability
The plugin processes stored form entry metadata using an unsafe unserialize() call without class restrictions. This allows unauthenticated attackers to inject malicious serialized objects through form fields, which are then processed by administrative pages.
Business impact
This vulnerability carries a CVSS score of 9.8, reflecting the potential for full Remote Code Execution (RCE). Successful exploitation could result in complete site takeover, database compromise, and further lateral movement within the hosting environment.
Remediation
Immediate Action: Update the Everest Forms plugin to the latest available version provided by the vendor.
Proactive Monitoring: Monitor for unusual database entries in the wp_evf_entrymeta table and audit server logs for suspicious PHP execution patterns.
Compensating Controls: Deploy a Web Application Firewall (WAF) with rules configured to detect and block malicious serialized PHP objects in HTTP requests.
Exploitation status
Public Exploit Available: No
Analyst recommendation
PHP Object Injection is a high-risk vulnerability that requires immediate remediation. Users of the Everest Forms plugin must update immediately and review all form entries for signs of malicious injection.