Description
The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the get_lead_fields function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in a Contact Form 7 plugin allows attackers to delete arbitrary files. Additionally, in certain server configurations, Remote Code Execution is possible
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
*
Timeline
2025-07-05: | Discovered |
2025-08-19: | Disclosed |
Credits
Nguyen Tan Phat
References
www.wordfence.com/...-ec4b-419f-84e1-84172d381411?source=cve
plugins.trac.wordpress.org/.../classes/class-wpcf7r-lead.php