Description
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the entries_shortcode() function in all versions up to, and including, 1.4.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract all form submissions - including names, emails, phone numbers.
Published: 2026-04-01
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Update Plugin
AI Analysis

Impact

The vulnerable plugin performs a missing capability check in the entries_shortcode() function, allowing any authenticated user with Contributor level or higher to retrieve all form submissions, including names, email addresses, and phone numbers. The flaw exposes sensitive personally identifying information without any external code execution or denial of service impact. This weakness is classified as a missing authorization (CWE‑862).

Affected Systems

The issue affects the Database for Contact Form 7, WPforms, and Elementor forms plugin for WordPress, specifically all releases up to and including version 1.4.9. Sites using this plugin to capture contact form data are at risk, regardless of the overall WordPress installation version.

Risk and Exploitability

With a CVSS base score of 4.3, the vulnerability is considered medium severity. Exploitation requires only authenticated access at the Contributor role or higher, which is commonly granted on many sites. Because the attacker does not need to bypass additional authentication layers, the risk to user data is significant if the role is improperly assigned. The issue is not listed in CISA's KEV catalog and no EPSS score is available, but the straightforward exploitation path suggests a moderate likelihood of attack.

Generated by OpenCVE AI on April 1, 2026 at 06:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Database for Contact Form 7, WPforms, and Elementor forms to the latest secure release (versions after 1.4.9).
  • If an immediate update is not possible, restrict the use of the entries_shortcode() function to Administrator‑only users or remove it entirely from public shortcodes.
  • Review role assignments and revoke Contributor access from users who do not need to view form entries.
  • Audit existing shortcodes for exposed endpoints and ensure that only authorized roles can influence them.

Generated by OpenCVE AI on April 1, 2026 at 06:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Crmperks
Crmperks database For Contact Form 7, Wpforms, Elementor Forms
Wordpress
Wordpress wordpress
Vendors & Products Crmperks
Crmperks database For Contact Form 7, Wpforms, Elementor Forms
Wordpress
Wordpress wordpress

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the entries_shortcode() function in all versions up to, and including, 1.4.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract all form submissions - including names, emails, phone numbers.
Title Database for Contact Form 7, WPforms, Elementor forms <= 1.4.9 - Missing Authorization to Authenticated (Contributor+) Sensitive Information Exposure via Shortcode
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Crmperks Database For Contact Form 7, Wpforms, Elementor Forms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:12:10.218Z

Reserved: 2026-03-09T13:37:57.000Z

Link: CVE-2026-3831

cve-icon Vulnrichment

Updated: 2026-04-01T13:13:43.007Z

cve-icon NVD

Status : Deferred

Published: 2026-04-01T02:16:03.357

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-3831

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:18:35Z

Weaknesses