TL;DR: This is a file read vulnerability (CVSS 8.1 HIGH). Authentication: Not required (unauthenticated). Patch immediately.
What This Vulnerability Is
The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read and Deletion in all versions up to, and including, 3.4.4. This is due to the plugin trusting attacker-controlled old_files data from public form submissions as legitimate server-side upload state, and converting attacker-supplied URLs into local filesystem paths using regex-based string replacement without canonicalization or directory boundary enforcement. This makes it possible for unauthenticated attackers to read arbitrary local files (e.g., wp-config.php) by injecting path-traversal payloads into the old_files upload field parameter, which are then attached to notification emails. The same path resolution is also used in the post-email cleanup routine, which calls unlink() on the resolved path, resulting in the targeted file being deleted after being attached. This can lead to full site compromise through disclosure of database credentials and authentication salts from wp-config.php, and denial of service through deletion of critical files. Prerequisite: The form must contain a file-upload or image-upload field, and disable storing entry information.
The National Vulnerability Database assigned this issue a CVSS base score of 8.1, placing it in the HIGH category. The identifier CVE-2026-5478 was published on 2026-04-20T20:16:48.800.
- CVE Identifier
- CVE-2026-5478
- CVSS Base Score
- 8.1 / 10.0 (HIGH)
- Published
- 2026-04-20T20:16:48.800
- NVD Entry
- https://nvd.nist.gov/vuln/detail/CVE-2026-5478
- MITRE Entry
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5478
Who Is Affected
Based on the vulnerability data published by NVD, the following products and configurations are identified as affected:
- Specific affected products are listed in the NVD entry. Review the CPE data for your stack.
If your organization uses any of the above, this vulnerability applies to your environment. Even if your specific version is not listed, review the full CPE match data to confirm.
How to Detect Exploitation
No CWE-specific detection template is available for this vulnerability class. Apply these general monitoring recommendations:
- Monitor vendor security advisories for indicators of compromise specific to this CVE
- Review application and system logs for unusual activity during the disclosure window
- Verify patch status across all instances of the affected product
- Check for unexpected configuration changes or new accounts
- Monitor outbound network traffic from affected systems for anomalies
Generic Triage
If you suspect exploitation, preserve logs and system state before applying patches. Contact your incident response team or Sherlock Forensics at 604.229.1994.
What to Do About It
Here is what we recommend, in order of priority:
- Check your exposure. Determine whether the affected software or component is present in your environment. Asset inventories and software composition analysis (SCA) tools are the fastest route.
- Apply the patch. If a vendor patch or updated version is available, apply it. Check the references below for vendor advisories.
- Mitigate if patching is not immediate. If you cannot patch right now, evaluate whether network segmentation, access control changes, or configuration adjustments reduce the attack surface for this specific vulnerability.
- Monitor for exploitation. Check whether proof-of-concept exploit code exists. The CISA Known Exploited Vulnerabilities catalog tracks actively exploited CVEs.
- Document your response. Record what you checked, when you patched, and what residual risk remains. This matters for compliance and for incident response if this vulnerability is exploited later.
Triage Quick Start
Run as administrator. Collect artifacts before applying patches or making changes:
# Linux/Unix systems
tar czf /tmp/triage-$(hostname)-$(date +%s).tgz \
/var/log/syslog /var/log/auth.log /var/log/messages \
/var/log/secure /var/log/apache2/ /var/log/nginx/ \
/etc/passwd /etc/shadow \
/root/.bash_history \
/home/*/.bash_history \
/tmp/ /var/tmp/ 2>/dev/null
# Windows systems (PowerShell)
# Compress-Archive -Path C:\Windows\System32\winevt\Logs\*,C:\inetpub\logs\* -DestinationPath C:\triage.zip
If you need help analyzing these artifacts, call Sherlock Forensics at 604.229.1994.
Why This Matters for Companies Without Security Teams
A CVSS score of 8.1 means this vulnerability is straightforward to exploit, likely to cause significant damage, or both. For startups and small companies operating without a dedicated security team, vulnerabilities at this severity level represent real operational risk rather than theoretical concern.
The challenge is not awareness. Vulnerability databases are public. The challenge is triage: understanding whether a given CVE affects your specific stack, and knowing what to do about it before an attacker does. If you lack the internal capacity to perform that assessment, an external review of your exposure is a concrete next step.
Sherlock Forensics provides vulnerability assessment and penetration testing for organizations that need to understand their attack surface without building a full internal security function.
References and Further Reading
- NVD: CVE-2026-5478
- MITRE: CVE-2026-5478
- https://plugins.trac.wordpress.org/browser/everest-forms/tags/3.4.4/includes/abstracts/class-evf-form-fields-upload.php#L1306
- https://plugins.trac.wordpress.org/browser/everest-forms/tags/3.4.4/includes/abstracts/class-evf-form-fields-upload.php#L1581
- https://plugins.trac.wordpress.org/browser/everest-forms/tags/3.4.4/includes/abstracts/class-evf-form-fields-upload.php#L1665
- https://plugins.trac.wordpress.org/changeset/3507814/everest-forms
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8641eb53-6a9a-4549-b8ef-e37acbcc7f03?source=cve
- CISA Known Exploited Vulnerabilities Catalog