Impact
The NEX‑Forms – Ultimate Form Builder WordPress plugin is vulnerable to limited code execution due to unsanitized user input in its get_table_records function. The flaw allows authenticated users with Custom-level privileges to supply a function name to call_user_func, which will execute any static method or global function that accepts a single array parameter. This capability can lead to arbitrary PHP execution within the WordPress environment, potentially enabling attackers to compromise the site, exfiltrate data, or install persistent malware.
Affected Systems
The vulnerability affects the NEX‑Forms – Ultimate Forms plugin for WordPress, all versions up to and including 8.9.1. Users should verify their plugin version and apply any available updates beyond 8.9.1.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity, and the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authentication and Custom-level access; attackers can trigger the flaw by invoking the get_table_records endpoint through the plugin’s interface, supplying a crafted function name. While the code execution is constrained, it provides sufficient control to potentially compromise the host server.
OpenCVE Enrichment
EUVD