Zero-Day Advisory

Fortinet Discovers WordPress Everest Forms SQL Injection Vulnerability


Fortinet's FortiGuard Labs has discovered a SQL injection vulnerability in WPEverest Everest Forms plugin for WordPress.

Everest Forms plugin provides you with an easy way to create any kind of forms including contact forms. Drag and Drop fields make ordering and creating forms so easy that even a beginner to WordPress can create beautiful forms within minutes. The plugin is lightweight, fast, extendible and 100% mobile responsive.

A SQL injection vulnerability exists in the WPEverest Everest Forms plugin through 1.4.9 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via includes/evf-entry-functions.php


FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:


User should apply the patch provided by WPEverest


Fortinet reported the vulnerability to WPEverest on July 10, 2019

WPEverest confirmed the vulnerability on July 11, 2019

WPEverest released patch for the vulnerability on July 15, 2019


This vulnerability was discovered by Tin Duong of Fortinet's FortiGuard Labs.

IPS Subscription

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this vulnerability with the appropriate configuration parameters in place. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.