The Everest Forms (Pro) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_entry_files() function in all versions up to, and including, 1.9.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability requires an admin to trigger the deletion via deletion of a form entry and cannot be carried out by the attacker alone.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Jun 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Everest Forms (Pro) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_entry_files() function in all versions up to, and including, 1.9.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability requires an admin to trigger the deletion via deletion of a form entry and cannot be carried out by the attacker alone. | |
Title | Everest Forms (Pro) <= 1.9.4 - Unauthenticated Path Traversal to Arbitrary File Deletion | |
Weaknesses | CWE-36 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-25T09:21:40.614Z
Updated: 2025-06-25T13:37:37.158Z
Reserved: 2025-06-09T14:37:01.886Z
Link: CVE-2025-5927

Updated: 2025-06-25T13:37:18.301Z

Status : Awaiting Analysis
Published: 2025-06-25T10:15:23.090
Modified: 2025-06-26T18:57:43.670
Link: CVE-2025-5927

No data.