1.0 Introduction
Recently, WordPress has released security updates to address a critical vulnerability (CVE-2025-7384) in the Database for Contact Form 7, WPforms, Elementor Form plugin, for WordPress.
2.0 Impact
The flaw, caused by insecure deserialization of untrusted input in the get_lead_detail function, could allow unauthenticated attackers to perform a PHP Object Injection attack. When combined with a PHP Object Payload (POP) chain present in the Contact Form 7 plugin, this vulnerability enables attackers to delete arbitrary files on the affected server. If the wp[1]config.php file is deleted, it may result in a complete denial of service or enable remote code execution.
3.0 Affected Products
- All versions up to and including version 1.4.3
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the security updates released by Wordfence and apply the necessary updates.
Kindly refer to the following URL:
Generally, we advise users of this device to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17.30 MYT
Web: https://www.cybersecurity.my
5.0 References
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/contact-form-entries/database-for-contact-form-7-wpforms-elementor-forms-143-unauthenticated-php-object-injection-to-arbitrary-file-deletion
- https://nvd.nist.gov/vuln/detail/CVE-2025-7384
- https://plugins.trac.wordpress.org/browser/contact-form-entries/tags/1.4.1/includes/data.php#L525
- https://plugins.trac.wordpress.org/changeset/3338764/#file9