CVE-2025-10019: Authorization Bypass Through User-Controlled Key in codepeople Contact Form Email
Authorization Bypass Through User-Controlled Key vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.60.
AI Analysis
Technical Summary
CVE-2025-10019 is an authorization bypass vulnerability found in the codepeople Contact Form Email plugin, affecting versions up to 1.3.60. The flaw arises from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization checks. This vulnerability enables unauthorized actors to access or potentially modify data that should be restricted, impacting confidentiality and integrity. The CVSS 3.1 base score of 6.5 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects confidentiality and integrity partially (C:L/I:L) but not availability (A:N). Since the vulnerability can be exploited remotely without authentication or user interaction, it poses a significant risk to exposed web servers running the vulnerable plugin. No known exploits have been reported in the wild, and no official patches have been linked yet, although the vulnerability was published in December 2025. The plugin is commonly used in WordPress environments to handle contact form submissions via email, making it a critical component in many organizational websites. Attackers exploiting this flaw could gain unauthorized access to sensitive form data or manipulate form processing, potentially leading to data leakage or further compromise.
Potential Impact
For European organizations, the impact of CVE-2025-10019 could be substantial, especially for SMEs and enterprises relying on WordPress websites with the vulnerable Contact Form Email plugin. Unauthorized access to contact form data can lead to leakage of personally identifiable information (PII), customer inquiries, or other sensitive communications, violating GDPR and other data protection regulations. Integrity compromise could allow attackers to alter form submissions or redirect communications, potentially facilitating phishing or social engineering attacks. While availability is not directly impacted, the reputational damage and regulatory penalties from data breaches could be severe. Organizations in sectors such as e-commerce, healthcare, legal services, and public administration that use this plugin for customer interaction are particularly at risk. The ease of exploitation without authentication increases the threat level, making automated scanning and exploitation feasible. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the codepeople Contact Form Email plugin, particularly versions up to 1.3.60. Until an official patch is released, mitigation should focus on restricting access to the plugin’s endpoints via web application firewalls (WAFs) or reverse proxies, implementing strict input validation and sanitization on user-controlled keys, and disabling or limiting the plugin’s functionality if feasible. Monitoring web server logs for unusual requests targeting the plugin’s parameters can help detect exploitation attempts early. Organizations should also review access control configurations to ensure that authorization checks are correctly enforced and not bypassable via user input. Applying principle of least privilege to web server and plugin permissions reduces potential damage. Additionally, organizations should prepare to deploy patches promptly once available and consider alternative contact form solutions with stronger security postures. Employee awareness about phishing and social engineering risks stemming from compromised contact forms should be enhanced.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10019: Authorization Bypass Through User-Controlled Key in codepeople Contact Form Email
Description
Authorization Bypass Through User-Controlled Key vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.60.
AI-Powered Analysis
Technical Analysis
CVE-2025-10019 is an authorization bypass vulnerability found in the codepeople Contact Form Email plugin, affecting versions up to 1.3.60. The flaw arises from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization checks. This vulnerability enables unauthorized actors to access or potentially modify data that should be restricted, impacting confidentiality and integrity. The CVSS 3.1 base score of 6.5 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects confidentiality and integrity partially (C:L/I:L) but not availability (A:N). Since the vulnerability can be exploited remotely without authentication or user interaction, it poses a significant risk to exposed web servers running the vulnerable plugin. No known exploits have been reported in the wild, and no official patches have been linked yet, although the vulnerability was published in December 2025. The plugin is commonly used in WordPress environments to handle contact form submissions via email, making it a critical component in many organizational websites. Attackers exploiting this flaw could gain unauthorized access to sensitive form data or manipulate form processing, potentially leading to data leakage or further compromise.
Potential Impact
For European organizations, the impact of CVE-2025-10019 could be substantial, especially for SMEs and enterprises relying on WordPress websites with the vulnerable Contact Form Email plugin. Unauthorized access to contact form data can lead to leakage of personally identifiable information (PII), customer inquiries, or other sensitive communications, violating GDPR and other data protection regulations. Integrity compromise could allow attackers to alter form submissions or redirect communications, potentially facilitating phishing or social engineering attacks. While availability is not directly impacted, the reputational damage and regulatory penalties from data breaches could be severe. Organizations in sectors such as e-commerce, healthcare, legal services, and public administration that use this plugin for customer interaction are particularly at risk. The ease of exploitation without authentication increases the threat level, making automated scanning and exploitation feasible. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
European organizations should immediately audit their web environments to identify installations of the codepeople Contact Form Email plugin, particularly versions up to 1.3.60. Until an official patch is released, mitigation should focus on restricting access to the plugin’s endpoints via web application firewalls (WAFs) or reverse proxies, implementing strict input validation and sanitization on user-controlled keys, and disabling or limiting the plugin’s functionality if feasible. Monitoring web server logs for unusual requests targeting the plugin’s parameters can help detect exploitation attempts early. Organizations should also review access control configurations to ensure that authorization checks are correctly enforced and not bypassable via user input. Applying principle of least privilege to web server and plugin permissions reduces potential damage. Additionally, organizations should prepare to deploy patches promptly once available and consider alternative contact form solutions with stronger security postures. Employee awareness about phishing and social engineering risks stemming from compromised contact forms should be enhanced.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:51:06.149Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0354eb3efac366fee20
Added to database: 12/18/2025, 7:41:41 AM
Last enriched: 1/20/2026, 7:39:24 PM
Last updated: 2/6/2026, 3:06:31 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-36599: n/a
MediumCVE-2026-2056: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.