top of page
perceptive_background_267k.jpg

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is d…

Published:

30 maart 2026 om 22:00:00

Alert date:

31 maart 2026 om 03:01:14

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

The Everest Forms Pro plugin for WordPress contains a critical remote code execution vulnerability in versions up to 1.9.12. The flaw exists in the Calculation Addon's process_filter() function which concatenates user-submitted form field values into PHP code without proper escaping before passing to eval(). The sanitize_text_field() function fails to escape single quotes and PHP code context characters. Unauthenticated attackers can exploit this by injecting crafted values in string-type form fields when the Complex Calculation feature is enabled, allowing arbitrary PHP code execution on the server.

Technical details

Mitigation steps:

Affected products:

Everest Forms Pro WordPress Plugin

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page