Home

Description

The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Limited Code Execution in all versions up to, and including, 8.9.1 via the get_table_records function. This is due to the unsanitized use of user-supplied input in call_user_func(). This makes it possible for authenticated attackers, with Custom-level access, to execute arbitrary PHP functions that meet specific constraints (static methods or global functions accepting a single array parameter).

PUBLISHED Reserved 2025-05-02 | Published 2025-05-08 | Updated 2025-05-08 | Assigner Wordfence




MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-01-26:Discovered
2025-05-07:Disclosed

Credits

Antonio Francesco Sardella finder

References

www.wordfence.com/...-d3a7-4e5a-ae9b-65fecc26dceb?source=cve

plugins.trac.wordpress.org/...lass.dashboard.php?rev=3226607

cve.org (CVE-2025-4208)

nvd.nist.gov (CVE-2025-4208)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.