Impact
The Contact Form vCard Generator plugin for WordPress contains a missing capability check in the wp_gvccf_check_download_request function. This flaw allows unauthenticated users to trigger the wp-gvc-cf-download-id parameter and exfiltrate Contact Form 7 submissions, including names, phone numbers, email addresses, and messages. The vulnerability directly compromises the confidentiality of user‑submitted data.
Affected Systems
All installations of the Contact Form vCard Generator plugin version 2.4 and earlier, distributed by ashishajani for WordPress sites, are affected. The plugin is deployed in every instance that has not been upgraded beyond version 2.4.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium impact, while the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit this weakness by sending unauthenticated HTTP requests that include a wp-gvc-cf-download-id parameter to the plugin’s endpoint, allowing widespread data extraction without requiring any credentials.
OpenCVE Enrichment