Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12718: CWE-20 Improper Input Validation in saadiqbal Quick Contact Form

0
Medium
VulnerabilityCVE-2025-12718cvecve-2025-12718cwe-20
Published: Sat Jan 17 2026 (01/17/2026, 02:22:32 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: Quick Contact Form

Description

The Quick Contact Form plugin for WordPress is vulnerable to Open Mail Relay in all versions up to, and including, 8.2.6. This is due to the 'qcf_validate_form' AJAX endpoint allowing a user controlled parameter to set the 'from' email address. This makes it possible for unauthenticated attackers to send emails to arbitrary recipients utilizing the server. The information is limited to the contact form submission details.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:03:18 UTC

Technical Analysis

CVE-2025-12718 identifies a vulnerability in the Quick Contact Form plugin for WordPress, specifically in all versions up to and including 8.2.6. The root cause is improper input validation (CWE-20) in the 'qcf_validate_form' AJAX endpoint, which accepts a user-controlled parameter that sets the 'from' email address in outgoing messages. Because this endpoint is accessible without authentication, an attacker can supply arbitrary 'from' addresses and send emails to any recipient via the vulnerable server, effectively turning the server into an open mail relay. This can be exploited for spam distribution, phishing, or other malicious email campaigns that leverage the trust of the compromised server's domain. The vulnerability does not expose sensitive data or allow direct system compromise but undermines email integrity and can damage organizational reputation. The CVSS v3.1 score is 5.8 (medium), reflecting network attack vector, no privileges required, no user interaction, and a scope change due to the relay capability. No patches or official fixes are currently linked, and no known exploits have been observed in the wild as of the published date. The vulnerability affects all versions of the Quick Contact Form plugin, which is widely used in WordPress environments, making it a relevant concern for many organizations relying on WordPress for web presence and communication.

Potential Impact

The primary impact of this vulnerability is the potential misuse of affected WordPress servers as open mail relays. This can lead to several negative consequences for organizations worldwide: increased spam and phishing emails sent from legitimate domains, damaging the organization's email reputation and potentially causing blacklisting by email providers. This can disrupt legitimate email communications and harm customer trust. Additionally, attackers may use the relay to obfuscate their origin, complicating incident response and attribution. While the vulnerability does not directly compromise system confidentiality or availability, the indirect effects on brand reputation, email deliverability, and potential legal or compliance issues related to spam propagation can be significant. Organizations with high email communication volumes or those in regulated industries may face amplified risks. The vulnerability also increases the attack surface for broader phishing campaigns that could lead to credential theft or malware distribution.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the Quick Contact Form plugin and verify the version in use. Since no official patch links are currently provided, administrators should consider the following mitigations: temporarily disable or remove the Quick Contact Form plugin until a secure update is available; restrict access to the 'qcf_validate_form' AJAX endpoint via web application firewalls (WAFs) or server-level access controls to prevent unauthenticated requests; implement email sending restrictions on the server to prevent unauthorized relaying, such as enforcing strict SMTP authentication and limiting allowed 'from' addresses; monitor outgoing email logs for unusual or unauthorized activity indicative of relay abuse; employ rate limiting on contact form submissions to reduce abuse potential; and stay informed on vendor updates or patches addressing this vulnerability. Additionally, organizations should review their email reputation and implement SPF, DKIM, and DMARC records to help mitigate spoofing and relay abuse consequences.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T20:55:18.963Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696af5b4b22c7ad8685027a6

Added to database: 1/17/2026, 2:36:36 AM

Last enriched: 2/27/2026, 9:03:18 PM

Last updated: 3/26/2026, 4:06:47 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses