Description
The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.0.2. The plugin stores spam detection logs at a predictable publicly accessible location (wp-content/uploads/stickeasy-protected-contact-form/spcf-log.txt). This makes it possible for unauthenticated attackers to download the log file and access sensitive information including visitor IP addresses, email addresses, and comment snippets from contact form submissions that were flagged as spam.
Published: 2026-02-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Disclosure
Action: Patch Update
AI Analysis

Impact

The plugin writes spam detection logs to a predictable location under wp‑content/uploads, making the file publicly readable. An unauthenticated attacker can retrieve the spcf‑log.txt file and obtain visitor IP addresses, email addresses, and comment snippets that were classified as spam, thereby violating confidentiality. This falls under CWE‑200, Sensitive Data Exposure.

Affected Systems

The vulnerability affects the StickEasy Protected Contact Form plugin for WordPress developed by Kasuga16. All released versions up to and including 1.0.2, which store logs in the public uploads folder, are impacted.

Risk and Exploitability

The CVSS score of 5.3 classifies the issue as moderate severity, while the EPSS score of <1% indicates a very low probability of exploitation at the time of analysis. The inconsistency between the EPSS metric and the CVSS score is a reminder that the vulnerability is straightforward to exploit: an attacker merely needs to request the public log file through the web server without authentication. The vulnerability is not listed in the CISA KEV catalog, so it is not a known exploited vulnerability as of now. Nonetheless, because the exposure is purely informational, organizations should consider patching promptly, especially if sensitive data is handled via the contact form.

Generated by OpenCVE AI on April 21, 2026 at 16:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade StickEasy Protected Contact Form to a version that removes the public log file vulnerability (e.g., 1.0.3 or newer).
  • If an immediate upgrade is impossible, delete or relocate the spcf‑log.txt file to a non‑public directory and adjust file permissions to deny public read access. The log directory should reside outside wp‑content/uploads so it is not directly accessible over HTTP.
  • Disable or remove spam detection logging within the plugin configuration if the option exists, or modify the plugin code to write logs to a secure, non‑exposed location.

Generated by OpenCVE AI on April 21, 2026 at 16:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Kasuga16
Kasuga16 stickeasy Protected Contact Form
Wordpress
Wordpress wordpress
Vendors & Products Kasuga16
Kasuga16 stickeasy Protected Contact Form
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.0.2. The plugin stores spam detection logs at a predictable publicly accessible location (wp-content/uploads/stickeasy-protected-contact-form/spcf-log.txt). This makes it possible for unauthenticated attackers to download the log file and access sensitive information including visitor IP addresses, email addresses, and comment snippets from contact form submissions that were flagged as spam.
Title StickEasy Protected Contact Form <= 1.0.1 - Unauthenticated Information Disclosure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Kasuga16 Stickeasy Protected Contact Form
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:56.587Z

Reserved: 2025-12-03T16:01:21.540Z

Link: CVE-2025-13973

cve-icon Vulnrichment

Updated: 2026-02-17T15:05:58.234Z

cve-icon NVD

Status : Deferred

Published: 2026-02-14T04:15:56.313

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13973

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:15:40Z

Weaknesses