Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12718: CWE-20 Improper Input Validation in saadiqbal Quick Contact Form

0
Medium
VulnerabilityCVE-2025-12718cvecve-2025-12718cwe-20
Published: Sat Jan 17 2026 (01/17/2026, 02:22:32 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: Quick Contact Form

Description

The Quick Contact Form plugin for WordPress is vulnerable to Open Mail Relay in all versions up to, and including, 8.2.6. This is due to the 'qcf_validate_form' AJAX endpoint allowing a user controlled parameter to set the 'from' email address. This makes it possible for unauthenticated attackers to send emails to arbitrary recipients utilizing the server. The information is limited to the contact form submission details.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:47:30 UTC

Technical Analysis

CVE-2025-12718 identifies a vulnerability in the Quick Contact Form WordPress plugin developed by saadiqbal, affecting all versions up to and including 8.2.6. The core issue is improper input validation (CWE-20) in the 'qcf_validate_form' AJAX endpoint, which accepts a user-controlled parameter to set the 'from' email address in outgoing messages. Because this endpoint is accessible without authentication, attackers can exploit it as an open mail relay, sending emails to arbitrary recipients through the compromised server. This vulnerability does not impact confidentiality directly, as it does not expose sensitive data, but it compromises integrity by allowing unauthorized email sending, which can be leveraged for spam, phishing, or other malicious campaigns. The vulnerability has a CVSS 3.1 base score of 5.8 (medium severity), reflecting its network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to the potential impact on external systems receiving the emails. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability's exploitation could lead to reputational damage for affected organizations, blacklisting of their mail servers, and increased spam filtering. The plugin is widely used in WordPress environments, especially by small and medium enterprises, making it a relevant threat vector. Detection requires monitoring for unusual outbound email patterns and validating the plugin's version and configuration. Remediation will involve patching the plugin when updates are released or applying temporary mitigations such as restricting mail relay capabilities at the server or mail gateway level.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of their email infrastructure. Exploitation allows attackers to send unauthorized emails from legitimate servers, which can lead to several negative consequences: increased spam and phishing campaigns originating from trusted domains, potential blacklisting of mail servers by email providers, and reputational damage among customers and partners. This can disrupt business communications and reduce trust in affected organizations. Additionally, organizations may face increased operational costs due to incident response and remediation efforts. Since the vulnerability requires no authentication or user interaction, it is relatively easy to exploit at scale. European companies relying on WordPress sites with the Quick Contact Form plugin, especially those in sectors with high online presence such as e-commerce, professional services, and media, are particularly vulnerable. The impact on confidentiality is minimal as no sensitive data leakage is indicated, and availability is not directly affected. However, the broader scope includes potential collateral damage to email recipients and the organization's external communications reputation.

Mitigation Recommendations

1. Monitor and inventory all WordPress sites within the organization to identify installations of the Quick Contact Form plugin and determine their versions. 2. Immediately restrict or disable the 'qcf_validate_form' AJAX endpoint if possible via plugin configuration or web application firewall (WAF) rules to block unauthenticated access. 3. Implement strict outbound mail relay restrictions on mail servers to prevent unauthorized use by web applications, including rate limiting and sender validation. 4. Monitor outgoing email logs for unusual patterns such as spikes in volume or emails sent to suspicious recipients. 5. Apply virtual patching using WAF or reverse proxy rules to sanitize or block requests containing suspicious 'from' email parameters until an official patch is released. 6. Engage with the plugin vendor or community to obtain or test patches as soon as they become available and apply updates promptly. 7. Educate site administrators on the risks of using outdated plugins and enforce policies for timely updates and vulnerability scanning. 8. Consider alternative contact form plugins with better security track records if patching is delayed. 9. Use email authentication mechanisms such as SPF, DKIM, and DMARC to reduce the impact of spoofed emails originating from compromised servers. 10. Coordinate with incident response teams to prepare for potential phishing or spam campaigns leveraging this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T20:55:18.963Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696af5b4b22c7ad8685027a6

Added to database: 1/17/2026, 2:36:36 AM

Last enriched: 1/24/2026, 7:47:30 PM

Last updated: 2/6/2026, 2:23:31 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats