Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10019: Authorization Bypass Through User-Controlled Key in codepeople Contact Form Email

0
Medium
VulnerabilityCVE-2025-10019cvecve-2025-10019
Published: Thu Dec 18 2025 (12/18/2025, 07:21:40 UTC)
Source: CVE Database V5
Vendor/Project: codepeople
Product: Contact Form Email

Description

Authorization Bypass Through User-Controlled Key vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.60.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:39:24 UTC

Technical Analysis

CVE-2025-10019 is an authorization bypass vulnerability found in the codepeople Contact Form Email plugin, affecting versions up to 1.3.60. The flaw arises from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization checks. This vulnerability enables unauthorized actors to access or potentially modify data that should be restricted, impacting confidentiality and integrity. The CVSS 3.1 base score of 6.5 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects confidentiality and integrity partially (C:L/I:L) but not availability (A:N). Since the vulnerability can be exploited remotely without authentication or user interaction, it poses a significant risk to exposed web servers running the vulnerable plugin. No known exploits have been reported in the wild, and no official patches have been linked yet, although the vulnerability was published in December 2025. The plugin is commonly used in WordPress environments to handle contact form submissions via email, making it a critical component in many organizational websites. Attackers exploiting this flaw could gain unauthorized access to sensitive form data or manipulate form processing, potentially leading to data leakage or further compromise.

Potential Impact

For European organizations, the impact of CVE-2025-10019 could be substantial, especially for SMEs and enterprises relying on WordPress websites with the vulnerable Contact Form Email plugin. Unauthorized access to contact form data can lead to leakage of personally identifiable information (PII), customer inquiries, or other sensitive communications, violating GDPR and other data protection regulations. Integrity compromise could allow attackers to alter form submissions or redirect communications, potentially facilitating phishing or social engineering attacks. While availability is not directly impacted, the reputational damage and regulatory penalties from data breaches could be severe. Organizations in sectors such as e-commerce, healthcare, legal services, and public administration that use this plugin for customer interaction are particularly at risk. The ease of exploitation without authentication increases the threat level, making automated scanning and exploitation feasible. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread abuse occurs.

Mitigation Recommendations

European organizations should immediately audit their web environments to identify installations of the codepeople Contact Form Email plugin, particularly versions up to 1.3.60. Until an official patch is released, mitigation should focus on restricting access to the plugin’s endpoints via web application firewalls (WAFs) or reverse proxies, implementing strict input validation and sanitization on user-controlled keys, and disabling or limiting the plugin’s functionality if feasible. Monitoring web server logs for unusual requests targeting the plugin’s parameters can help detect exploitation attempts early. Organizations should also review access control configurations to ensure that authorization checks are correctly enforced and not bypassable via user input. Applying principle of least privilege to web server and plugin permissions reduces potential damage. Additionally, organizations should prepare to deploy patches promptly once available and consider alternative contact form solutions with stronger security postures. Employee awareness about phishing and social engineering risks stemming from compromised contact forms should be enhanced.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:51:06.149Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0354eb3efac366fee20

Added to database: 12/18/2025, 7:41:41 AM

Last enriched: 1/20/2026, 7:39:24 PM

Last updated: 2/6/2026, 3:06:31 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats