Everest Forms WordPress Plugin PHP Object Injection Vulnerability
The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.
The Everest Forms plugin for WordPress, a widely used form builder, contains a critical PHP Object Injection vulnerability (CVE-2026-3296) affecting versions up to and including 3.4.3. This vulnerability stems from the insecure deserialization of user-supplied data within the html-admin-page-entries-view.php file. Specifically, the plugin uses PHP’s unserialize() function on form entry metadata stored in the wp_evf_entrymeta table without specifying allowed classes, creating an exploitable condition. An unauthenticated attacker can inject malicious serialized PHP objects through any public form field. The sanitize_text_field() function fails to prevent these attacks because it doesn’t strip serialization control characters. This allows attackers to execute arbitrary PHP code on the WordPress server when an administrator views form entries. This vulnerability poses a significant risk to WordPress sites using the Everest Forms plugin.
Attack Chain
- An unauthenticated attacker submits a malicious serialized PHP object through a public Everest Forms form field.
- The submitted payload bypasses the
sanitize_text_field()function due to the function’s failure to remove serialization control characters. - The crafted serialized object is stored in the
wp_evf_entrymetadatabase table associated with the form entry. - An administrator accesses the WordPress administration panel and navigates to the Everest Forms entries section.
- The
html-admin-page-entries-view.phpfile is executed to display form entries and their associated metadata. - The plugin retrieves the stored serialized object from the
wp_evf_entrymetatable. - The
unserialize()function is called on the retrieved data without theallowed_classesparameter, triggering PHP Object Injection. - The injected PHP object is instantiated, leading to arbitrary PHP code execution on the server, potentially granting the attacker complete control over the WordPress site.
Impact
Successful exploitation of this vulnerability (CVE-2026-3296) can lead to complete compromise of the WordPress website. An attacker can gain remote code execution, allowing them to inject malware, deface the site, steal sensitive data (including user credentials and financial information), or use the compromised server as part of a botnet. Given the widespread use of the Everest Forms plugin, a large number of WordPress sites are potentially vulnerable. The CVSS v3.1 base score of 9.8 reflects the critical severity of this vulnerability.
Recommendation
- Immediately update the Everest Forms plugin to the latest version (greater than 3.4.3) to patch CVE-2026-3296.
- Deploy the Sigma rule
Detect Suspicious unserialize Call in Everest Formsto identify potential exploitation attempts in web server logs. - Monitor web server logs for suspicious POST requests to WordPress form submission endpoints containing serialized PHP objects, as detected by the
Detect Suspicious Form Submission with Serialized DataSigma rule. - Implement a Web Application Firewall (WAF) rule to block requests containing serialized PHP objects in form submission data.
Detection coverage 2
Detect Suspicious unserialize Call in Everest Forms
criticalDetects calls to the unserialize function in the Everest Forms plugin without specifying allowed classes, indicating a potential PHP Object Injection vulnerability.
Detect Suspicious Form Submission with Serialized Data
highDetects POST requests to WordPress form submission endpoints containing serialized PHP objects.
Detection queries are kept inside the platform. Get full rules →