Description
The User Registration Using Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_cf7_form_data' function in all versions up to, and including, 2.5. This makes it possible for unauthenticated attackers to retrieve form settings which includes Facebook app secrets.
Published: 2026-01-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Information Disclosure
Action: Apply Patch
AI Analysis

Impact

The User Registration Using Contact Form 7 plugin for WordPress lacks a capability check in the 'get_cf7_form_data' function for all versions up to 2.5. Because of this missing authorization, any unauthenticated attacker can call the function and receive the full set of form settings, which includes sensitive data such as Facebook application secrets. The vulnerability corresponds to missing authorization (CWE‑862). This exposure compromises the confidentiality of application credentials and could enable further compromise of linked services.

Affected Systems

WordPress sites that have installed the User Registration Using Contact Form 7 plugin from the 'zealopensource' vendor, any version 2.5 or lower, are affected. The plugin is commonly used to populate Contact Form 7 forms with user registration data.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and an EPSS of less than 1% suggests exploitation is currently unlikely, though not impossible. The vulnerability can be exploited over the network by any unauthenticated user who can reach the plugin’s 'get_cf7_form_data' endpoint, but the precise location of this endpoint is not detailed in the advisory and is inferred from the plugin’s API exposure. The flaw is not listed in CISA’s KEV catalog, but it remains a valid medium‑risk flaw for any affected WordPress installation. An attacker who successfully retrieves the form settings could use the Facebook app secrets to impersonate the site or drain sensitive data from connected services. The flaw is most likely exploitable in publicly accessible sites that host the plugin and lack additional access controls.

Generated by OpenCVE AI on April 21, 2026 at 23:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the User Registration Using Contact Form 7 plugin to the latest available version, which resolves the missing capability check.
  • If an update is not possible immediately, disable or delete the plugin to remove the exposed endpoint.
  • Add a custom code snippet to the theme’s functions.php that blocks unauthenticated requests to the 'get_cf7_form_data' route or implements a role‑based check before the plugin’s data is returned.

Generated by OpenCVE AI on April 21, 2026 at 23:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 17 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The User Registration Using Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_cf7_form_data' function in all versions up to, and including, 2.5. This makes it possible for unauthenticated attackers to retrieve form settings which includes Facebook app secrets.
Title User Registration Using Contact Form 7 <= 2.5 - Authenticated (Subscriber+) Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:16:59.140Z

Reserved: 2025-11-06T19:06:39.317Z

Link: CVE-2025-12825

cve-icon Vulnrichment

Updated: 2026-01-20T18:34:27.924Z

cve-icon NVD

Status : Deferred

Published: 2026-01-17T05:16:09.070

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12825

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:00:03Z

Weaknesses