<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-3296 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-3296/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 02:16:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-3296/feed.xml" rel="self" type="application/rss+xml"/><item><title>Everest Forms WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</link><pubDate>Wed, 08 Apr 2026 02:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, a widely used form builder, contains a critical PHP Object Injection vulnerability (CVE-2026-3296) affecting versions up to and including 3.4.3. This vulnerability stems from the insecure deserialization of user-supplied data within the <code>html-admin-page-entries-view.php</code> file. Specifically, the plugin uses PHP&rsquo;s <code>unserialize()</code> function on form entry metadata stored in the <code>wp_evf_entrymeta</code> table without specifying allowed classes, creating an exploitable condition. An unauthenticated attacker can inject malicious serialized PHP objects through any public form field. The <code>sanitize_text_field()</code> function fails to prevent these attacks because it doesn&rsquo;t strip serialization control characters. This allows attackers to execute arbitrary PHP code on the WordPress server when an administrator views form entries. This vulnerability poses a significant risk to WordPress sites using the Everest Forms plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker submits a malicious serialized PHP object through a public Everest Forms form field.</li>
<li>The submitted payload bypasses the <code>sanitize_text_field()</code> function due to the function&rsquo;s failure to remove serialization control characters.</li>
<li>The crafted serialized object is stored in the <code>wp_evf_entrymeta</code> database table associated with the form entry.</li>
<li>An administrator accesses the WordPress administration panel and navigates to the Everest Forms entries section.</li>
<li>The <code>html-admin-page-entries-view.php</code> file is executed to display form entries and their associated metadata.</li>
<li>The plugin retrieves the stored serialized object from the <code>wp_evf_entrymeta</code> table.</li>
<li>The <code>unserialize()</code> function is called on the retrieved data <em>without</em> the <code>allowed_classes</code> parameter, triggering PHP Object Injection.</li>
<li>The injected PHP object is instantiated, leading to arbitrary PHP code execution on the server, potentially granting the attacker complete control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3296) can lead to complete compromise of the WordPress website. An attacker can gain remote code execution, allowing them to inject malware, deface the site, steal sensitive data (including user credentials and financial information), or use the compromised server as part of a botnet. Given the widespread use of the Everest Forms plugin, a large number of WordPress sites are potentially vulnerable. The CVSS v3.1 base score of 9.8 reflects the critical severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to the latest version (greater than 3.4.3) to patch CVE-2026-3296.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious unserialize Call in Everest Forms</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests to WordPress form submission endpoints containing serialized PHP objects, as detected by the <code>Detect Suspicious Form Submission with Serialized Data</code> Sigma rule.</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing serialized PHP objects in form submission data.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category><category>cve-2026-3296</category></item></channel></rss>