Description
The Contact Form 7 with ChatWork plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_token' and 'roomid' settings in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the settings page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2025-12-12
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via admin‑only settings
Action: Immediate Patch
AI Analysis

Impact

The Contact Form 7 with ChatWork plugin for WordPress contains a stored cross‑site scripting flaw caused by inadequate sanitization of the 'api_token' and 'roomid' fields. This weakness, identified as CWE‑79, allows authenticated users who have at least administrator privileges to inject malicious JavaScript that will run whenever another user visits the plugin settings page. The scripts execute with the same privileges as the viewer, potentially enabling further privilege escalation or data theft within the WordPress installation.

Affected Systems

The vulnerability exists in all releases of the izuchy Contact Form 7 with ChatWork plugin up to and including version 1.1.0. It affects multi‑site WordPress installations and only impacts sites where the unfiltered_html capability has been disabled. Sites using newer plugin versions are not affected.

Risk and Exploitability

The CVSS score of 4.4 indicates a moderate risk level. The EPSS score of less than 1 % implies a very low exploitation probability at present, and the flaw is not listed in the CISA KEV catalog. The flaw requires authenticated access with administrator or higher privilege, so it is not exploitable by unauthenticated actors. An attacker would need to compromise an administrator account or a highly privileged role, then inject script code into the settings page, which would subsequently be executed by other site users who view that page.

Generated by OpenCVE AI on April 20, 2026 at 21:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Contact Form 7 with ChatWork plugin to the latest version that removes the vulnerable input handling.
  • If an update is not yet available, disable or uninstall the plugin from the WordPress site to eliminate the stored‑XSS vector.
  • Restrict administrator and super‑administrator accounts to the minimum necessary user roles or enforce strong multi‑factor authentication to reduce the risk of privileged compromise.

Generated by OpenCVE AI on April 20, 2026 at 21:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Izuchy
Izuchy contact Form 7 With Chatwork
Wordpress
Wordpress wordpress
Vendors & Products Izuchy
Izuchy contact Form 7 With Chatwork
Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Contact Form 7 with ChatWork plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_token' and 'roomid' settings in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the settings page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Contact Form 7 with ChatWork <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'api_token' and 'roomid' Settings
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Izuchy Contact Form 7 With Chatwork
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:24.616Z

Reserved: 2025-12-03T16:35:46.064Z

Link: CVE-2025-13975

cve-icon Vulnrichment

Updated: 2025-12-12T19:44:33.130Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T04:15:45.347

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:30:18Z

Weaknesses