<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5478 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5478/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 20 Apr 2026 20:35:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5478/feed.xml" rel="self" type="application/rss+xml"/><item><title>Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</link><pubDate>Mon, 20 Apr 2026 20:35:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, versions 3.4.4 and earlier, contains an arbitrary file read and deletion vulnerability (CVE-2026-5478). This flaw stems from the plugin&rsquo;s improper handling of the <code>old_files</code> parameter within form submissions. Specifically, the plugin trusts attacker-controlled data as legitimate server-side upload state and insecurely converts URLs into local filesystem paths without adequate sanitization. This lack of input validation enables unauthenticated attackers to inject path traversal sequences, leading to the disclosure of sensitive files like <code>wp-config.php</code>, which contains database credentials and authentication salts. Furthermore, the flawed path resolution is utilized in a post-email cleanup routine, resulting in arbitrary file deletion via the <code>unlink()</code> function, potentially causing a denial-of-service condition. Successful exploitation requires a form with a file-upload or image-upload field and the &ldquo;store entry information&rdquo; feature disabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP POST request to a WordPress page containing an Everest Forms form with a file upload field.</li>
<li>The attacker includes the <code>old_files</code> parameter in the POST data, injecting a path traversal payload (e.g., <code>../../../../wp-config.php</code>) into its value.</li>
<li>The WordPress application processes the form submission, and the Everest Forms plugin extracts the <code>old_files</code> parameter.</li>
<li>The plugin&rsquo;s flawed logic converts the attacker-supplied URL into a local file system path using regex-based string replacement without canonicalization or directory boundary enforcement.</li>
<li>The plugin attaches the resolved file (e.g., <code>/var/www/wordpress/../../../../wp-config.php</code>) to the notification email.</li>
<li>After sending the notification email, the post-email cleanup routine utilizes the same flawed path resolution to determine the file to delete.</li>
<li>The <code>unlink()</code> function is called on the resolved path, leading to the deletion of the targeted file (e.g., <code>wp-config.php</code>).</li>
<li>The attacker gains access to sensitive information (database credentials, salts) or causes a denial of service by deleting critical system files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5478 allows unauthenticated attackers to read arbitrary files on the WordPress server, potentially exposing sensitive information like database credentials and authentication salts stored in <code>wp-config.php</code>. This could lead to full site compromise, including data theft, defacement, or further malicious activities. Furthermore, the ability to delete arbitrary files enables attackers to cause a denial-of-service condition by removing critical system or application files. The impact is significant as it affects all versions of the Everest Forms plugin up to and including 3.4.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to a version higher than 3.4.4 to patch CVE-2026-5478.</li>
<li>Deploy the Sigma rule &ldquo;Detect Everest Forms Arbitrary File Read Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enable web server logging to capture HTTP POST requests, which are crucial for detecting path traversal attempts (cs-uri-query, cs-method in webserver logs).</li>
<li>Monitor file deletion events on the WordPress server, especially those initiated by the web server user, using a file integrity monitoring (FIM) solution (file_event logs).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>cve-2026-5478</category></item></channel></rss>