The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called.
History

Wed, 06 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 Aug 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Emarketdesign
Emarketdesign request A Quote
Wordpress
Wordpress wordpress
Vendors & Products Emarketdesign
Emarketdesign request A Quote
Wordpress
Wordpress wordpress

Wed, 06 Aug 2025 02:45:00 +0000

Type Values Removed Values Added
Description The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called.
Title Request a Quote Form Plugin <= 2.5.2 - Unauthenticated Limited Remote Code Execution
Weaknesses CWE-95
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-08-06T02:24:12.120Z

Updated: 2025-08-06T13:36:32.676Z

Reserved: 2025-07-31T14:35:50.620Z

Link: CVE-2025-8420

cve-icon Vulnrichment

Updated: 2025-08-06T13:36:24.370Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-06T03:15:27.730

Modified: 2025-08-06T20:23:37.600

Link: CVE-2025-8420

cve-icon Redhat

No data.