Home

Description

The Gravity Forms plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the legacy chunked upload mechanism in all versions up to, and including, 2.9.21.1. This is due to the extension blacklist not including .phar files, which can be uploaded through the chunked upload mechanism. This makes it possible for unauthenticated attackers to upload executable .phar files and achieve remote code execution on the server, granted they can discover or enumerate the upload path. In order for an attacker to achieve RCE, the web server needs to be set up to process .phar file as PHP via file handler mapping or similar.

PUBLISHED Reserved 2025-11-10 | Published 2025-11-18 | Updated 2025-11-19 | Assigner Wordfence




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-10:Vendor Notified
2025-11-17:Disclosed

Credits

Talal Nasraddeen finder

References

www.wordfence.com/...-da45-4b64-8e30-b106dffd46c1?source=cve

github.com/...073e9d0d491e17b89365b48c20/includes/upload.php

github.com/...4f073e9d0d491e17b89365b48c20/common/common.php

docs.gravityforms.com/gravityforms-change-log/

cve.org (CVE-2025-12974)

nvd.nist.gov (CVE-2025-12974)

Download JSON