Description
Multiple plugins for WordPress by emarket-design with the 'emd-form-builder-lite' package are vulnerable to Remote Code Execution in various versions via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called
Published: 2025-08-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

An unauthenticated remote code execution flaw exists in a number of WordPress plugins from emarket‑design where the emd_form_builder_lite_pagenum function accepts user input and uses it directly as a callable function name without validation or sanitization. This lack of verification allows an attacker to force the plugin to invoke arbitrary PHP functions on the server, potentially altering application data, reading sensitive files, or loading malicious code. The weakness corresponds to Code Injection (CWE‑95). Because the vulnerability permits execution without passing arguments, the impact is limited to function calls that do not require parameters, but the ability to execute any permitted function already endangers system integrity.

Affected Systems

The affected products encompass a range of emarket‑design WordPress plugins including the Employee Directory, Campus Directory, Customer Support Ticket System, Event RSVP, Project Management, Request a Quote Form, Simple Contact Form, and Video Gallery plug‑ins, as well as the cyberlord92 Employee Directory – Staff Directory and Listing. All versions that bundle the 'emd-form-builder-lite' package are vulnerable; specific version numbers are not supplied in the advisory. Site owners running any of these plugins on a WordPress installation should assume that the components are at risk until patched.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity vulnerability, while the EPSS score of less than 1% suggests a low current exploitation probability. The issue is not yet listed in the CISA KEV catalog. Attackers can exploit the flaw over the public web interfaces exposed by WordPress, requiring no prior authentication. Because the vulnerable endpoint can be accessed by any user, the risk surface is broad and the potential impact for an attacker is substantial if the site accepts an unexpected function name. Administrators should treat this as a high‑risk condition while the fix is applied.

Generated by OpenCVE AI on April 21, 2026 at 03:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update all emarket‑design plugins to the latest releases that include the emd‑form‑builder‑lite patch.
  • If an update is not feasible, remove or deactivate the emd‑form‑builder‑lite component from the affected plugins to eliminate the vulnerable function.
  • Restrict administrative access to the WordPress installation and configure a web application firewall rule to block crafted requests targeting the emd_form_builder_lite_pagenum end‑point.

Generated by OpenCVE AI on April 21, 2026 at 03:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23716 The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called. Multiple plugins for WordPress by emarket-design with the 'emd-form-builder-lite' package are vulnerable to Remote Code Execution in various versions via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called
Title Request a Quote Form Plugin <= 2.5.2 - Unauthenticated Limited Remote Code Execution Multiple Plugins by emarket-design <= Multiple Versions - Unauthenticated Limited Remote Code Execution
References

Wed, 06 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 Aug 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Emarketdesign
Emarketdesign request A Quote
Wordpress
Wordpress wordpress
Vendors & Products Emarketdesign
Emarketdesign request A Quote
Wordpress
Wordpress wordpress

Wed, 06 Aug 2025 02:45:00 +0000

Type Values Removed Values Added
Description The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called.
Title Request a Quote Form Plugin <= 2.5.2 - Unauthenticated Limited Remote Code Execution
Weaknesses CWE-95
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Emarketdesign Request A Quote
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:56:28.904Z

Reserved: 2025-07-31T14:35:50.620Z

Link: CVE-2025-8420

cve-icon Vulnrichment

Updated: 2025-08-06T13:36:24.370Z

cve-icon NVD

Status : Deferred

Published: 2025-08-06T03:15:27.730

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8420

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:45:27Z

Weaknesses