The flaw, rated 8.8 (High) on the CVSS scale, affects the popular Forminator Forms – Contact Form, Payment Form, and Custom Form Builder plugin in all versions up to and including 1.4.2.12.
The vulnerability allows unauthenticated attackers to delete arbitrary files on the server by exploiting insufficient validation in the plugin’s core file handling logic.
The root cause lies in the entry_delete_upload_files() function, which failed to properly restrict file deletions to legitimate upload fields and the designated WordPress uploads directory.
Attackers can craft malicious form submissions that specify the path to any server file, most dangerously, wp-config.php.
If this critical configuration file is deleted, WordPress enters setup mode, allowing the attacker to connect the site to a database under their control, leading to complete site takeover.
The vulnerability is triggered when a form submission—containing a malicious file path—is deleted, either manually by an administrator or automatically by plugin settings.
The plugin’s logic did not check whether the field was intended for file uploads or whether the file path was within the allowed directory.
As a result, even non-upload fields could be abused to reference sensitive files.
Key technical issues:
Example attack flow:
/var/www/html/wp-config.php).Vulnerable Code Snippet (pre-patch):
phppublic static function entry_delete_upload_files( $form_id, $entry_model ) {
foreach ( $entry_model->meta_data as $meta_data ) {
$meta_value = $meta_data['value'];
if ( is_array( $meta_value ) && isset( $meta_value['file'] ) ) {
$file_path = is_array( $meta_value['file']['file_path'] ) ? $meta_value['file']['file_path'] : array( $meta_value['file']['file_path'] );
foreach ( $file_path as $path ) {
if ( ! empty( $path ) && file_exists( $path ) ) {
wp_delete_file( $path );
}
}
}
}
}
This code trusted user-supplied values without type or path checks, enabling the exploit.
The vulnerability was responsibly disclosed by security researcher Phat RiO – BlueRock through the Wordfence Bug Bounty Program, earning an $8,100 bounty—the highest in the program’s history.
The vendor, WPMU DEV, patched the flaw in version 1.44.3 by:
Immediate steps for site administrators:
wp-config.phpFailure to act leaves sites exposed to remote code execution and total compromise.
This incident underscores the necessity of rigorous input validation, prompt patching, and proactive security monitoring in all WordPress environments.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post Severe WordPress Plugin Flaw Puts Over 600,000 Sites at Risk of Remote Takeover appeared first on Cyber Security News.
INDIANAPOLIS, Ind. (WOWO) — 18 people were arrested in a drug bust on the north…
ALLEN COUNTY, Ind. (WOWO) — The Allen County Office of Emergency Management is urging residents…
The U.S. Capitol building in Washington, D.C., amid fog on Tuesday, Dec. 10, 2024. (Photo…
Thinking of getting a new 4K action camera for your outdoor adventures but don't want…
The developers of Dead by Daylight tell me they're extremely committed to keeping the game…
I am not the best at building nice-looking areas in Pokémon Pokopia. My buildings aren't…
This website uses cookies.