Description
Missing Authorization vulnerability in ZealousWeb Accept PayPal Payments using Contact Form 7 contact-form-7-paypal-extension allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept PayPal Payments using Contact Form 7: from n/a through <= 4.0.4.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of payment processing
Action: Patch Now
AI Analysis

Impact

The vulnerability is a missing authorization flaw in the ZealousWeb Accept PayPal Payments using Contact Form 7 plugin that allows users without the proper privileges to perform privileged actions. By bypassing the intended access control, an attacker could modify subscription plans, alter transaction amounts, or trigger unauthorized payments, directly compromising the financial integrity of the site.

Affected Systems

This flaw affects all releases of the ZealousWeb Accept PayPal Payments using Contact Form 7 WordPress plugin from its earliest version up to 4.0.4. No later versions are currently listed as vulnerable.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests limited likelihood of widespread exploitation. The vulnerability is not cataloged in the CISA Known Exploited Vulnerabilities list, and no publicly disclosed exploit is available. The likely attack vector is a web‑based request to the plugin’s endpoints, inferred from the missing authorization description and the need to reach the WordPress site.

Generated by OpenCVE AI on April 13, 2026 at 22:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the Accept PayPal Payments using Contact Form 7 plugin (4.0.5 or newer) if available; the patch removes the missing access control logic.
  • Verify that the plugin is no longer listed as vulnerable by checking the vendor’s release notes or scanning tools.
  • Ensure the WordPress core and all other plugins are kept up to date to reduce overall exposure.

Generated by OpenCVE AI on April 13, 2026 at 22:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Zealousweb
Zealousweb accept Paypal Payments Using Contact Form 7
Vendors & Products Wordpress
Wordpress wordpress
Zealousweb
Zealousweb accept Paypal Payments Using Contact Form 7

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in ZealousWeb Accept PayPal Payments using Contact Form 7 contact-form-7-paypal-extension allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept PayPal Payments using Contact Form 7: from n/a through <= 4.0.4.
Title WordPress Accept PayPal Payments using Contact Form 7 plugin <= 4.0.4 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
Zealousweb Accept Paypal Payments Using Contact Form 7
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:52:04.465Z

Reserved: 2026-04-07T10:58:22.476Z

Link: CVE-2026-39707

cve-icon Vulnrichment

Updated: 2026-04-13T18:18:03.535Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T09:16:43.490

Modified: 2026-04-24T18:05:35.730

Link: CVE-2026-39707

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:38:22Z

Weaknesses