Description
The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).
Published: 2025-11-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Payment Confirmation
Action: Apply Patch
AI Analysis

Impact

The CP Contact Form with PayPal plugin contains a missing authorization flaw that allows an unauthenticated attacker to trigger payment confirmation logic without providing valid PayPal IPN credentials. By sending a forged request containing arbitrary POST data (payment_status, txn_id, payer_email) to the unprotected cp_contactformpp_ipncheck endpoint, an attacker can mark any form submission as paid even though no actual transaction has taken place. This could enable financial fraud, inflate metrics, or trigger downstream processes that rely on confirmed payments.

Affected Systems

WordPress sites running CP Contact Form with PayPal through version 1.3.56 or earlier are impacted. The vulnerability is present in all releases of the plugin with a public endpoint that accepts unauthenticated POST data and does not verify a PayPal signature or nonce.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity. The EPSS score is below 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need only network access to the site and the ability to send HTTP POST requests to the cp_contactformpp_ipncheck query string. No authentication or special test prerequisites are required, making the vulnerability readily exploitable by automated scripts.

Generated by OpenCVE AI on April 21, 2026 at 18:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update CP Contact Form with PayPal to the latest version that removes the unauthenticated IPN endpoint or adds proper authentication and signature verification.
  • If an immediate update is not possible, block or disable the cp_contactformpp_ipncheck endpoint by using web‑application‑firewall rules or .htaccess directives to reject unauthenticated POST requests to that query parameter.
  • In code, add server‑side checks for PayPal IPN signatures or a site‑specific nonce before processing payment confirmations, ensuring only legitimate notifications are accepted.

Generated by OpenCVE AI on April 21, 2026 at 18:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Codepeople
Codepeople cp Contact Form With Paypal
Wordpress
Wordpress wordpress
Vendors & Products Codepeople
Codepeople cp Contact Form With Paypal
Wordpress
Wordpress wordpress

Sat, 22 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).
Title CP Contact Form with PayPal <= 1.3.56 - Missing Authorization to Unauthenticated Arbitrary Payment Confirmation
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Codepeople Cp Contact Form With Paypal
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:57:57.779Z

Reserved: 2025-11-18T20:44:10.384Z

Link: CVE-2025-13384

cve-icon Vulnrichment

Updated: 2025-11-24T19:30:58.849Z

cve-icon NVD

Status : Deferred

Published: 2025-11-22T08:15:44.647

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:15:36Z

Weaknesses