Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12718: CWE-20 Improper Input Validation in saadiqbal Quick Contact Form

0
Medium
VulnerabilityCVE-2025-12718cvecve-2025-12718cwe-20
Published: Sat Jan 17 2026 (01/17/2026, 02:22:32 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: Quick Contact Form

Description

CVE-2025-12718 is a medium severity vulnerability in the Quick Contact Form WordPress plugin (all versions up to 8. 2. 6) that allows unauthenticated attackers to exploit an open mail relay via the 'qcf_validate_form' AJAX endpoint. The flaw arises because the endpoint permits user-controlled input to set the 'from' email address without proper validation, enabling attackers to send emails to arbitrary recipients through the vulnerable server. This can lead to abuse such as spam distribution or phishing campaigns originating from trusted domains. No authentication or user interaction is required, and the vulnerability affects all plugin versions. While no known exploits are currently reported in the wild, the vulnerability's scope and ease of exploitation make it a significant risk for WordPress sites using this plugin. The CVSS score is 5. 8 (medium), reflecting limited impact on confidentiality but potential integrity abuse. European organizations running WordPress sites with this plugin should prioritize mitigation to prevent misuse of their mail servers.

AI-Powered Analysis

AILast updated: 01/17/2026, 02:51:50 UTC

Technical Analysis

CVE-2025-12718 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the Quick Contact Form plugin for WordPress, maintained by the vendor saadiqbal. The vulnerability exists in all versions up to and including 8.2.6. The root cause is the 'qcf_validate_form' AJAX endpoint, which accepts a user-controlled parameter that sets the 'from' email address in outgoing emails. Because this input is not properly validated or sanitized, unauthenticated attackers can manipulate it to send emails with arbitrary 'from' addresses to arbitrary recipients, effectively turning the vulnerable server into an open mail relay. This can facilitate spam campaigns, phishing attacks, or other malicious email activities that abuse the trustworthiness of the compromised server's domain. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely over the network. The CVSS v3.1 base score is 5.8, with vector AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, and a scope change due to the ability to affect other systems via email. The impact is primarily on integrity, as attackers can send unauthorized emails, but confidentiality and availability are not directly affected. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the published date (January 17, 2026).

Potential Impact

For European organizations, this vulnerability poses a risk of their WordPress-hosted websites being abused as open mail relays. This can lead to reputational damage if their domains are used to send spam or phishing emails, potentially causing their mail servers or IP addresses to be blacklisted by email providers and security services. Such blacklisting can disrupt legitimate email communications, impacting business operations and customer trust. Additionally, attackers may leverage this vulnerability to conduct targeted phishing campaigns against European users or partners, increasing the risk of credential theft or malware infections. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if the vulnerability leads to indirect data breaches or fraud. The ease of exploitation without authentication increases the likelihood of automated abuse attempts, making timely mitigation critical.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Quick Contact Form plugin and its version. If the plugin is installed, they should disable or remove it until a vendor patch is available. In the absence of an official patch, organizations can implement temporary mitigations such as restricting access to the 'qcf_validate_form' AJAX endpoint via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests. Additionally, configuring outbound mail servers to require authentication and to reject emails with spoofed 'from' addresses can reduce abuse. Monitoring outgoing email traffic for unusual patterns or spikes can help detect exploitation attempts. Organizations should also ensure that their email servers are properly configured with SPF, DKIM, and DMARC records to help receiving mail servers identify and reject spoofed emails. Finally, maintaining regular backups and monitoring WordPress plugin updates will facilitate prompt patching once a fix is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T20:55:18.963Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696af5b4b22c7ad8685027a6

Added to database: 1/17/2026, 2:36:36 AM

Last enriched: 1/17/2026, 2:51:50 AM

Last updated: 1/17/2026, 4:01:57 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats