πŸ” CVE Alert

CVE-2026-3300

CRITICAL 9.8

Everest Forms Pro <= 1.9.12 - Unauthenticated Remote Code Execution via Calculation Field

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted form field values into a PHP code string without proper escaping before passing it to eval(). The sanitize_text_field() function applied to input does not escape single quotes or other PHP code context characters. This makes it possible for unauthenticated attackers to inject and execute arbitrary PHP code on the server by submitting a crafted value in any string-type form field (text, email, URL, select, radio) when a form uses the "Complex Calculation" feature.

CWE CWE-94
Vendor wpeverest
Product everest forms pro
Published Mar 31, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for wpeverest everest forms pro

Be the first to know when new critical vulnerabilities affecting wpeverest everest forms pro are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

WPEverest / Everest Forms Pro
0 ≀ 1.9.12

References

NVD β†— CVE.org β†— EPSS Data β†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/389c0b89-e408-4ad5-9723-a16b745771f0?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/everest-forms/tags/3.4.3/includes/class-evf-form-task.php#L584 everestforms.net: https://everestforms.net/changelog/

Credits

PhΓΊ