Multiple plugins for WordPress by emarket-design with the 'emd-form-builder-lite' package are vulnerable to Remote Code Execution in various versions via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called
References
Configurations
No configuration.
History
08 Apr 2026, 18:25
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Multiple plugins for WordPress by emarket-design with the 'emd-form-builder-lite' package are vulnerable to Remote Code Execution in various versions via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called | |
| References |
|
06 Aug 2025, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Aug 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-06 03:15
Updated : 2026-04-08 18:25
NVD link : CVE-2025-8420
Mitre link : CVE-2025-8420
CVE.ORG link : CVE-2025-8420
JSON object : View
Products Affected
No product.
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
