Overview
CVE-2025-5927 identifies a significant vulnerability in the Everest Forms (Pro) plugin for WordPress. This vulnerability could potentially allow an unauthenticated attacker to delete arbitrary files on the server, leading to system compromise or data leakage. This vulnerability affects all versions of the plugin up to, and including, version 1.9.4 and has serious implications for website administrators who rely on this plugin for their WordPress installations.
Vulnerability Summary
CVE ID: CVE-2025-5927
Severity: High, CVSS 7.5
Attack Vector: Network
Privileges Required: None
User Interaction: Required (Admin)
Impact: Potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Everest Forms (Pro) Plugin for WordPress| Up to and including 1.9.4
How the Exploit Works
This vulnerability arises due to insufficient file path validation in the delete_entry_files() function of the Everest Forms (Pro) plugin. An attacker can exploit this flaw to delete arbitrary files on the server. However, this action requires an admin to trigger the deletion via deletion of a form entry. If a crucial file such as wp-config.php is deleted, it can lead to remote code execution.
Conceptual Example Code
This is a conceptual example of a malicious HTTP request that an attacker could use to exploit this vulnerability:
POST /wp-admin/admin-ajax.php?action=everest_forms_delete_entry_files HTTP/1.1
Host: target.example.com
Content-Type: application/json
{
"form_id": "1",
"entry_id": "1",
"file_path": "../../../../wp-config.php"
}
In this example, the attacker is attempting to delete the wp-config.php file, which could lead to remote code execution.
Mitigation Guidance
To mitigate this vulnerability, users are advised to apply the vendor patch as soon as it becomes available. In the meantime, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can be used as temporary mitigation. Always remember to keep your plugins updated to the latest version to avoid known vulnerabilities.

