The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Limited Code Execution in all versions up to, and including, 8.9.1 via the get_table_records function. This is due to the unsanitized use of user-supplied input in call_user_func(). This makes it possible for authenticated attackers, with Custom-level access, to execute arbitrary PHP functions that meet specific constraints (static methods or global functions accepting a single array parameter).
References
Configurations
History
04 Jun 2025, 22:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Basixonline nex-forms
Basixonline |
|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/browser/nex-forms-express-wp-form-builder/trunk/includes/classes/class.dashboard.php?rev=3226607#L3420 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1d2b7215-d3a7-4e5a-ae9b-65fecc26dceb?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:* |
08 May 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-08 12:15
Updated : 2025-06-04 22:58
NVD link : CVE-2025-4208
Mitre link : CVE-2025-4208
CVE.ORG link : CVE-2025-4208
JSON object : View
Products Affected
basixonline
- nex-forms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')