Introduction
A single unauthenticated request can let an attacker execute code on a WordPress site running the Request a Quote Form plugin, potentially leading to full site compromise. This vulnerability affects a plugin commonly used by small businesses and B2B service providers to manage quote requests, making its impact broad across the WordPress ecosystem.
About the Request a Quote Form Plugin: The Request a Quote Form plugin is a widely adopted WordPress extension designed to streamline quote and inquiry management for business websites. With thousands of active installations, it is a go-to tool for organizations seeking to automate and centralize their quotation workflows within WordPress.
Technical Information
CVE-2025-8420 is a remote code execution vulnerability in the Request a Quote Form plugin for WordPress, affecting all versions up to and including 2.5.2. The vulnerability resides in the emd_form_builder_lite_pagenum
function, which is part of the plugin's form builder functionality. This function fails to properly validate and sanitize user input before using it as a function name in dynamic code execution. As a result, an unauthenticated attacker can manipulate the input to execute arbitrary functions on the server.
Key technical points:
- The root cause is improper input validation (CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code).
- The vulnerable function processes user-supplied data as a function name, allowing code execution without authentication.
- Parameters cannot be passed to the called functions, which may limit the attacker's options but does not eliminate the risk of compromise.
- No public code snippets or proof of concept are available as of this writing.
Affected Systems and Versions
- Product: Request a Quote Form plugin for WordPress
- Affected versions: All versions up to and including 2.5.2
- Any WordPress site with this plugin at or below version 2.5.2 is vulnerable regardless of configuration.
Vendor Security History
The Request a Quote Form plugin has a history of active development and regular feature updates. However, this vulnerability highlights a significant lapse in secure coding practices, specifically around input validation. No additional information is available regarding previous vulnerabilities or the vendor's patch response times.