🔐 CVE Alert

CVE-2025-9260

MEDIUM 6.5

Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder 5.1.16 - 6.1.1 - Authenticated (Subscriber+) PHP Object Injection To Arbitrary File Read

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to PHP Object Injection in versions 5.1.16 to 6.1.1 via deserialization of untrusted input in the parseUserProperties function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to read arbitrary files. If allow_url_include is enabled on the server, remote code execution is possible. While the vendor patched this issue in version 6.1.0, the patch caused a fatal error in the vulnerable code, due to a missing class import, so we consider 6.1.2 to be the most complete and best patched version

CWE CWE-502
Vendor techjewel
Product fluent forms – customizable contact forms, survey, quiz, & conversational form builder
Published Sep 2, 2025
Last Updated Sep 3, 2025
Stay Ahead of the Next One

Get instant alerts for techjewel fluent forms – customizable contact forms, survey, quiz, & conversational form builder

Be the first to know when new medium vulnerabilities affecting techjewel fluent forms – customizable contact forms, survey, quiz, & conversational form builder are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

techjewel / Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
5.1.16 ≤ 6.1.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/938e5d6b-1ad6-4021-a148-1d1c9e8a0a83?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/fluentform/tags/6.0.2/app/Services/FormBuilder/EditorShortcodeParser.php#L214 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/fluentform/tags/6.0.2/vendor/wpfluent/framework/src/WPFluent/View/View.php#L7

Credits

Craig Smith