VulnTitan

VulnTitan

The WordPress Vulnerability Index

Request a Quote Form Plugin <= 2.5.2 - Unauthenticated Limited Remote Code Execution

plugin
High
  • Vulnerability Database
  • /
  • Request a Quote Form Plugin <= 2.5.2 - Unauthenticated Limited Remote Code Execution
8.1
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
CVE CVE-2025-8420
CVSS 8.1 (High)
Publicly Published Aug 05, 2025
Last Updated Aug 27, 2025
Researchers mikemyers theviper17y

Description

The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called.

References

Share

Vulnerability Details

Software Type plugin
Software Slug software-issue-manager (view on wordpress.org)
Patched Yes
Remediation Update to version 5.0.1, or a newer patched version
Affected Versions
  • * - 5.0.0
Patched Versions
  • 5.0.1

This record contains material that is subject to copyright

Copyright 2012-2025 Defiant Inc.

License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more.


Copyright 1999-2025 The MITRE Corporation

License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more.