Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 22 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Themeisle
Themeisle redirection For Contact Form 7 Wordpress Wordpress wordpress |
|
| Vendors & Products |
Themeisle
Themeisle redirection For Contact Form 7 Wordpress Wordpress wordpress |
Sun, 21 Dec 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server. | |
| Title | Redirection for Contact Form 7 <= 3.2.7 - Unauthenticated Arbitrary File Copy via move_file_to_upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-22T16:37:02.508Z
Reserved: 2025-12-16T20:20:41.998Z
Link: CVE-2025-14800
Updated: 2025-12-22T16:36:58.868Z
Status : Awaiting Analysis
Published: 2025-12-21T08:15:48.473
Modified: 2025-12-23T14:51:52.650
Link: CVE-2025-14800
No data.
OpenCVE Enrichment
Updated: 2025-12-22T11:40:21Z