The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server.

Subscriptions

Vendors Products
Themeisle Subscribe
Redirection For Contact Form 7 Subscribe
Wordpress Subscribe
Wordpress Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 22 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Themeisle
Themeisle redirection For Contact Form 7
Wordpress
Wordpress wordpress
Vendors & Products Themeisle
Themeisle redirection For Contact Form 7
Wordpress
Wordpress wordpress

Sun, 21 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server.
Title Redirection for Contact Form 7 <= 3.2.7 - Unauthenticated Arbitrary File Copy via move_file_to_upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-12-22T16:37:02.508Z

Reserved: 2025-12-16T20:20:41.998Z

Link: CVE-2025-14800

cve-icon Vulnrichment

Updated: 2025-12-22T16:36:58.868Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-21T08:15:48.473

Modified: 2025-12-23T14:51:52.650

Link: CVE-2025-14800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-22T11:40:21Z

Weaknesses