Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal

0
High
VulnerabilityCVE-2025-13384cvecve-2025-13384cwe-862
Published: Sat Nov 22 2025 (11/22/2025, 07:29:19 UTC)
Source: CVE Database V5
Vendor/Project: codepeople
Product: CP Contact Form with PayPal

Description

The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).

AI-Powered Analysis

AILast updated: 11/29/2025, 08:15:51 UTC

Technical Analysis

CVE-2025-13384 is a Missing Authorization vulnerability (CWE-862) found in the CP Contact Form with PayPal plugin for WordPress, affecting all versions up to and including 1.3.56. The vulnerability stems from the plugin exposing an unauthenticated endpoint triggered via the 'cp_contactformpp_ipncheck' query parameter. This endpoint mimics PayPal's Instant Payment Notification (IPN) mechanism but lacks critical security controls such as authentication, nonce verification, and validation of PayPal IPN signatures. Consequently, attackers can send arbitrary POST requests containing forged payment data fields like payment_status, txn_id, and payer_email to this endpoint. The plugin then processes these forged notifications as legitimate payment confirmations, marking form submissions as paid without any actual financial transaction. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (High), reflecting the ease of exploitation and the significant impact on data integrity, as attackers can manipulate payment status records. While no public exploits have been reported yet, the flaw presents a clear risk to organizations relying on this plugin for payment processing, potentially leading to financial fraud and loss of trust. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to financial integrity and operational trustworthiness. Organizations using the CP Contact Form with PayPal plugin to handle payments or donations may face fraudulent payment confirmations, leading to unauthorized access to goods, services, or benefits without actual payment. This can result in direct financial losses, accounting discrepancies, and reputational damage. Additionally, the manipulation of payment records can undermine customer trust and complicate compliance with financial regulations such as GDPR, which mandates accurate transaction records. The vulnerability's remote and unauthenticated exploitability means attackers can operate from anywhere, increasing the threat landscape. E-commerce businesses, non-profits accepting donations, and service providers relying on this plugin are particularly vulnerable. The absence of nonce or signature validation also means automated exploitation or mass fraud attempts could be feasible, amplifying potential damage.

Mitigation Recommendations

1. Immediately restrict access to the 'cp_contactformpp_ipncheck' endpoint by implementing web server rules (e.g., .htaccess, nginx config) to allow only trusted IP addresses or block all external access until a patch is available. 2. Monitor web server logs for unusual POST requests to this endpoint, especially those with suspicious payment_status or txn_id values, to detect potential exploitation attempts. 3. If possible, disable the CP Contact Form with PayPal plugin temporarily or replace it with a more secure payment processing solution until an official patch is released. 4. Implement additional validation layers at the application level, such as verifying payment confirmations directly with PayPal's official IPN or webhook services, ensuring that payment notifications are genuine. 5. Educate site administrators on the risks and encourage timely updates once a security patch is published. 6. Conduct regular audits of payment records to identify discrepancies that may indicate fraudulent confirmations. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block forged IPN-like requests targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T20:44:10.384Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69216996633f6b6b24ab4794

Added to database: 11/22/2025, 7:43:18 AM

Last enriched: 11/29/2025, 8:15:51 AM

Last updated: 1/7/2026, 4:18:03 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats