Skip to content

Conversation

carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

🎯 Content Summary

Everest Forms Unauthenticated PHP Object Injection (CVE-2025-52709)

Everest Forms versions 3.2.2 and earlier suffer from an unauthenticated PHP Object Injection vulnerability (CVE-2025-52709) when an Administrator views form submissions on PHP < 7.1. This flaw allows attackers to inject and instantiate arbitrary PHP objects, leading to remote code execution.

Vulnerability Overview

The plugin’s custom wrapper evf_maybe_unse...

🔧 Technical Details

When PHP’s unserialize() is invoked without the allowed_classes option, any serialized object string can instantiate arbitrary classes and set their properties. If those classes implement magic methods like __wakeup() or __destruct(), an attacker’s crafted payload can execute arbitrary code or perform unauthorized actions upon object destruction or initialization.

🤖 Agent Actions

Added comprehensive coverage of PHP unserialize() security options and the Everest Forms CVE-2025-52709 object-injection case study.

Key updates in src/pentesting-web/deserialization/README.md:

  1. New subsection “Preventing PHP Object Injection with allowed_classes”
    • Explains allowed_classes mitigation, legacy PHP risk, secure/whitelist examples.
    • Real-world exploit walk-through of Everest Forms ≤ 3.2.2 wrapper logic and RCE payload.
    • Take-away checklist for developers/auditors.

  2. Inserted Patchstack advisory reference into the References list.

These additions reinforce existing PHP deserialization content without creating redundant pages.

✅ Review Checklist

  • Content is technically accurate
  • Formatting follows HackTricks style guidelines
  • Links and references are working
  • Content adds educational value
  • No sensitive information is exposed

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://patchstack.com/articles/critical-vulnerability-impacting-over-100k-sites-patched-in-everest-forms-plugin/

Content Categories: Based on the analysis, this content was categorized under "generic-hacking/php-object-injection.md".

Repository Maintenance:

  • MD Files Formatting: 865 files processed

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop
Copy link
Collaborator Author

merge

@carlospolop carlospolop merged commit 26fda67 into master Aug 10, 2025
@carlospolop carlospolop deleted the update_Critical_Vulnerability_Impacting_Over_100K_Sites_P_20250806_182934 branch August 10, 2025 14:01
s3llh0lder pushed a commit to s3llh0lder/hacktricks that referenced this pull request Aug 22, 2025
…ritical_Vulnerability_Impacting_Over_100K_Sites_P_20250806_182934

Critical Vulnerability Impacting Over 100K Sites Patched in ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant