Description
Missing Authorization vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.58.
Published: 2025-11-13
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Missing authorization in the Contact Form Email plugin allows an attacker to exploit incorrectly configured access control levels. The vulnerability can enable unauthorized users to perform privileged actions within the plugin, which may lead to the disclosure of personal data submitted through contact forms or the manipulation of form behavior. It is classified under CWE-862 and receives a CVSS score of 6.5, indicating a moderate severity risk.

Affected Systems

The affected product is the codepeople Contact Form Email WordPress plugin, version 1.3.58 and all earlier releases. WordPress sites running any version up to 1.3.58 are impacted unless the plugin has been updated, removed, or the access controls have been manually hardened.

Risk and Exploitability

The EPSS score is less than 1%, indicating a low exploitation probability at the present time, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, attackers may target this flaw through the web interface or exposed administrative URLs, leveraging the missing authorization checks. Because the CVSS score is 6.5, the risk is moderate but should not be ignored, especially on publicly accessible sites that still use the vulnerable plugin version.

Generated by OpenCVE AI on April 29, 2026 at 12:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Contact Form Email plugin to a version newer than 1.3.58.
  • Disable or remove the plugin if it is no longer needed.
  • Ensure that the plugin's settings are accessed only by users with appropriate administrative privileges and that the WordPress authentication system is properly configured.
  • Audit exposed URLs and validate that no unintended users can reach the plugin’s administrative endpoints.

Generated by OpenCVE AI on April 29, 2026 at 12:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 17 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Codepeople
Codepeople contact Form Email
Wordpress
Wordpress wordpress
Vendors & Products Codepeople
Codepeople contact Form Email
Wordpress
Wordpress wordpress

Thu, 13 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.58.
Title WordPress Contact Form Email plugin <= 1.3.58 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Codepeople Contact Form Email
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:31:48.885Z

Reserved: 2025-10-31T11:23:15.211Z

Link: CVE-2025-64369

cve-icon Vulnrichment

Updated: 2025-11-17T19:16:46.124Z

cve-icon NVD

Status : Deferred

Published: 2025-11-13T10:15:53.423

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-64369

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T12:45:11Z

Weaknesses