Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12825: CWE-862 Missing Authorization in zealopensource User Registration Using Contact Form 7

0
Medium
VulnerabilityCVE-2025-12825cvecve-2025-12825cwe-862
Published: Sat Jan 17 2026 (01/17/2026, 04:34:02 UTC)
Source: CVE Database V5
Vendor/Project: zealopensource
Product: User Registration Using Contact Form 7

Description

The User Registration Using Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_cf7_form_data' function in all versions up to, and including, 2.5. This makes it possible for unauthenticated attackers to retrieve form settings which includes Facebook app secrets.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:51:13 UTC

Technical Analysis

CVE-2025-12825 is a vulnerability identified in the 'User Registration Using Contact Form 7' WordPress plugin developed by zealopensource. The issue stems from a missing capability check in the 'get_cf7_form_data' function, which is responsible for retrieving form settings. Due to the absence of proper authorization validation, unauthenticated attackers can invoke this function remotely and access sensitive configuration data, notably Facebook app secrets embedded in the form settings. These secrets are critical as they can be used to manipulate Facebook app integrations, potentially enabling attackers to impersonate the app, harvest user data, or conduct social engineering attacks. The vulnerability affects all plugin versions up to and including 2.5. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based with no privileges or user interaction required, but the impact is limited to confidentiality loss without affecting integrity or availability. No public exploits have been reported yet, but the exposure of Facebook app secrets increases the risk profile. The vulnerability was reserved in November 2025 and published in January 2026. No official patches are currently linked, indicating that users must monitor for updates or implement interim controls.

Potential Impact

For European organizations, this vulnerability poses a confidentiality risk by exposing Facebook app secrets used in WordPress sites leveraging the affected plugin. Such exposure can lead to unauthorized access to Facebook app functionalities, enabling attackers to perform malicious actions like data harvesting, unauthorized API calls, or social engineering campaigns targeting users. Organizations relying on Facebook integrations for authentication, marketing, or user engagement could see reputational damage and potential regulatory scrutiny under GDPR if user data is compromised. The lack of integrity or availability impact limits direct service disruption, but the indirect consequences of compromised app secrets can be significant. Small and medium enterprises using WordPress with this plugin are particularly vulnerable due to limited security resources. The threat is heightened in sectors with strong social media presence or customer interaction through Facebook, such as retail, media, and public services in Europe.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the 'get_cf7_form_data' function by implementing custom authorization checks at the web server or application level, such as IP whitelisting or requiring authentication for accessing plugin endpoints. Administrators should monitor web server logs for suspicious access patterns targeting the vulnerable function. Until an official patch is released, disabling or removing the plugin can eliminate the attack surface. Organizations should also review and rotate Facebook app secrets if exposure is suspected to prevent misuse. Employing Web Application Firewalls (WAFs) with rules to block unauthorized requests to the plugin’s endpoints can provide additional protection. Regularly updating WordPress core and plugins, and subscribing to vulnerability notifications from the plugin vendor or security communities, will ensure timely patching once available. Finally, conducting security audits on third-party plugins before deployment can help identify similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-06T19:06:39.317Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b1558b22c7ad86881e276

Added to database: 1/17/2026, 4:51:36 AM

Last enriched: 1/24/2026, 7:51:13 PM

Last updated: 2/6/2026, 7:34:27 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats