Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codepeople
Codepeople cp Contact Form With Paypal Wordpress Wordpress wordpress |
|
| Vendors & Products |
Codepeople
Codepeople cp Contact Form With Paypal Wordpress Wordpress wordpress |
Sat, 22 Nov 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email). | |
| Title | CP Contact Form with PayPal <= 1.3.56 - Missing Authorization to Unauthenticated Arbitrary Payment Confirmation | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-24T19:31:03.108Z
Reserved: 2025-11-18T20:44:10.384Z
Link: CVE-2025-13384
Updated: 2025-11-24T19:30:58.849Z
Status : Awaiting Analysis
Published: 2025-11-22T08:15:44.647
Modified: 2025-11-25T22:16:42.557
Link: CVE-2025-13384
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:08:19Z