Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Forminator Plugin Flaw Risks 600,000 Sites

July 2, 2025
Reading Time: 2 mins read
in Alerts
Forminator Plugin Flaw Risks 600,000 Sites

A severe arbitrary file deletion vulnerability has been discovered in the popular Forminator WordPress plugin, affecting many websites. This critical security flaw impacts over 600,000 active installations of the form-building plugin on websites worldwide. The vulnerability is tracked as CVE-2025-6463 and has received a high CVSS rating of 8.8 from researchers. It allows unauthenticated attackers to delete critical system files, including the essential wp-config.php WordPress configuration file. This could potentially lead to a complete site takeover by a malicious actor and also remote code execution. The security researcher Phat RiO – BlueRock discovered and responsibly disclosed this significant flaw to the plugin developers.

The vulnerability was first reported on June 20, 2025, affecting all Forminator versions up to and including 1.44.2.

The security flaw stems from insufficient file path validation in the plugin’s entry_delete_upload_files() function. This specific function is responsible for processing the deletion of form submissions that have been created by website visitors. What makes this vulnerability particularly dangerous is its high potential for completely unauthenticated remote exploitation by attackers. Attackers can craft malicious form submissions containing arbitrary file paths to exploit this very serious security flaw.

When these submissions are deleted, the specified files are permanently removed from the website’s hosting server.

The most critical attack scenario involves deleting the wp-config.php file, which contains important database credentials. When this configuration file is removed, WordPress enters a setup state, allowing attackers to take full control. An attacker can then configure the site with a database under their control, achieving complete site compromise. The core technical issue lies in the entry_delete_upload_files() function’s lack of any proper security checks. The vulnerable code processes all metadata values that match a file array structure without verifying field types. Attackers can exploit this by submitting forms with crafted file path values to delete any server file.

WPMU DEV, the plugin developer, responded promptly to the vulnerability disclosure and released a comprehensive security patch. The new patch was released in version 1.44.3 on June 30, 2025, to address the critical vulnerability. The security patch implements multiple layers, including field type validation and restricting file deletion to upload fields. The patched code now includes validation to ensure file paths remain within the WordPress uploads directory. This important change effectively prevents any directory traversal attacks from being successful against the website. All WordPress administrators are strongly urged to update to version 1.44.3 immediately to prevent potential exploitation.

Reference:

  • Unauthenticated Attack on Forminator Plugin Can Lead To Full Site Takeover
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025
Hackers Revive SEO Poisoning

Hackers Revive SEO Poisoning

July 10, 2025
Hackers Revive SEO Poisoning

RondoDox Botnet Exploits Router Flaws

July 10, 2025
Hackers Revive SEO Poisoning

ServiceNow Data Exposure via ACLs

July 10, 2025

Latest Alerts

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Subscribe to our newsletter

    Latest Incidents

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial