Ameeba Chat App store presentation
Download Ameeba Chat Today
Ameeba Blog Search

CVE-2025-8145: PHP Object Injection Vulnerability in Redirection for Contact Form 7 WordPress Plugin

Ameeba’s Mission: Safeguarding privacy by securing data and communication with our patented anonymization technology.

Overview

The Redirection for Contact Form 7 WordPress plugin is subject to a severe security vulnerability, identified under the code CVE-2025-8145. The weakness lies in its susceptibility to PHP Object Injection in versions up to, and including, 3.2.4. This vulnerability could potentially affect millions of websites running on the WordPress platform that utilize this plugin, posing a significant risk of system compromise and data leakage.
The importance of this vulnerability is underlined by its CVSS Severity Score of 8.8, which indicates a high level of severity. It opens the door for unauthenticated attackers to inject a PHP Object and, given the right conditions, even execute remote code.

Vulnerability Summary

CVE ID: CVE-2025-8145
Severity: High – 8.8 CVSS Score
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Potential system compromise and data leakage

Affected Products

Ameeba Chat Icon Escape the Surveillance Era

Most apps won’t tell you the truth.
They’re part of the problem.

Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.

Ameeba Chat gives you a way out.

  • • No phone number
  • • No email
  • • No personal info
  • • Anonymous aliases
  • • End-to-end encrypted

Chat without a trace.

Product | Affected Versions

Redirection for Contact Form 7 WordPress Plugin | Up to and including 3.2.4

How the Exploit Works

The vulnerability occurs in the get_lead_fields function of the Redirection for Contact Form 7 WordPress plugin, which is susceptible to PHP Object Injection. This happens due to the deserialization of untrusted inputs, allowing an attacker to inject a PHP Object. The presence of a POP chain in a Contact Form 7 plugin enables attackers to delete arbitrary files. Furthermore, under certain server configurations, Remote Code Execution is possible.

Conceptual Example Code

The following is a conceptual example of how the vulnerability might be exploited. An attacker could send an HTTP POST request with a malicious payload to the vulnerable endpoint:

POST /contact-form-7/endpoint HTTP/1.1
Host: target.example.com
Content-Type: application/json
{
"form_data": "O:4:\"Lead\":2:{s:4:\"name\";s:5:\"Attacker\";s:4:\"file\";s:9:\"/etc/passwd\";}"
}

In the example above, the attacker is injecting a serialized PHP Object in the form data. This object has a property ‘file’ that refers to the ‘/etc/passwd’ file. This would lead to the deletion of the mentioned file, leading to potential data loss or system instability.

Solutions and Mitigations

The vendor has issued a patch for this vulnerability, and it’s strongly recommended to apply this patch immediately. In case the patch cannot be applied immediately, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can be used as a temporary mitigation to detect and block attempts to exploit this vulnerability. However, these are not long-term solutions, and the patch should be applied as soon as possible to ensure system security.

Talk freely. Stay anonymous with Ameeba Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat