Description
Authorization Bypass Through User-Controlled Key vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.60.
Published: 2025-12-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WordPress Contact Form Email plugin contains an information disclosure vulnerability where the use of a user‑controlled key bypasses authorization. This IDOR flaw allows an unauthenticated or low‑privileged user to retrieve or manipulate data associated with other forms. The weakness is mapped to CWE‑639 and could expose personal information submitted through the plugin or alter form configurations. It does not lead to remote code execution but enables unauthorized access to configured form data.

Affected Systems

Affected installations include any WordPress site running codepeople’s Contact Form Email plugin version 1.3.60 or earlier. The vulnerability exists in all releases from the first public version through 1.3.60. The CVE specifically references the plugin as a whole, so any deployment of that product in the identified range is impacted.

Risk and Exploitability

Security analysts rate the flaw as CVSS 6.5, indicating moderate severity. The EPSS score of less than 1 % suggests that known exploits are rare and the attack surface is limited. The bug is not listed in CISA’s KEV catalog, so it is not known to have widespread exploitation. Attackers could trigger the IDOR by crafting requests that include a valid key parameter to an endpoint used by the plugin, potentially on a publicly accessible site. Given the moderate impact and low exploitation probability, the risk is moderate but still requires mitigation to prevent accidental data exposure.

Generated by OpenCVE AI on May 1, 2026 at 06:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Contact Form Email plugin to the latest version (1.3.61 or later).
  • Verify that no sensitive form data is exposed via URLs or keys; test for IDOR after the upgrade.
  • Review and enforce WordPress permission settings so that only authorized users can access form data.

Generated by OpenCVE AI on May 1, 2026 at 06:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Codepeople
Codepeople contact Form Email
Wordpress
Wordpress wordpress
Vendors & Products Codepeople
Codepeople contact Form Email
Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.60.
Title WordPress Contact Form Email plugin <= 1.3.60 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Codepeople Contact Form Email
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:10:57.279Z

Reserved: 2025-09-05T10:51:06.149Z

Link: CVE-2025-10019

cve-icon Vulnrichment

Updated: 2025-12-18T18:26:24.615Z

cve-icon NVD

Status : Deferred

Published: 2025-12-18T08:15:48.657

Modified: 2026-04-27T17:16:24.090

Link: CVE-2025-10019

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T06:15:10Z

Weaknesses