Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13973: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in kasuga16 StickEasy Protected Contact Form

0
Medium
VulnerabilityCVE-2025-13973cvecve-2025-13973cwe-200
Published: Sat Feb 14 2026 (02/14/2026, 03:25:27 UTC)
Source: CVE Database V5
Vendor/Project: kasuga16
Product: StickEasy Protected Contact Form

Description

The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.0.2. The plugin stores spam detection logs at a predictable publicly accessible location (wp-content/uploads/stickeasy-protected-contact-form/spcf-log.txt). This makes it possible for unauthenticated attackers to download the log file and access sensitive information including visitor IP addresses, email addresses, and comment snippets from contact form submissions that were flagged as spam.

AI-Powered Analysis

AILast updated: 02/14/2026, 06:38:31 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13973 affects the StickEasy Protected Contact Form plugin for WordPress, specifically all versions up to and including 1.0.2. This plugin is designed to protect contact forms from spam submissions. However, it stores spam detection logs in a file named spcf-log.txt located in the wp-content/uploads/stickeasy-protected-contact-form directory. This location is publicly accessible and predictable, meaning that an unauthenticated attacker can directly access and download this log file via a web browser or automated script without any authentication or user interaction. The log file contains sensitive information such as visitor IP addresses, email addresses, and snippets of comments submitted through the contact form that were flagged as spam. This exposure constitutes a CWE-200 vulnerability, which is an exposure of sensitive information to unauthorized actors. The CVSS 3.1 base score is 5.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely without privileges or user interaction, and impacts confidentiality but not integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily threatens privacy and confidentiality, potentially enabling attackers to harvest personal data for further malicious activities such as phishing or targeted attacks.

Potential Impact

For European organizations, this vulnerability poses a significant privacy risk, especially under stringent data protection regulations such as the GDPR. Exposure of visitor IP addresses and email addresses can lead to unauthorized profiling, targeted phishing campaigns, and reputational damage. Organizations relying on the StickEasy Protected Contact Form plugin may inadvertently leak personal data of their customers or users, resulting in potential regulatory fines and loss of trust. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious consequences, particularly for sectors handling sensitive or personal information such as healthcare, finance, and government services. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated scanning and data harvesting by malicious actors. European organizations with public-facing WordPress sites using this plugin are at risk of data leakage, which could also be leveraged for subsequent attacks or social engineering campaigns.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the wp-content/uploads/stickeasy-protected-contact-form directory via web server configuration (e.g., using .htaccess rules or equivalent in Nginx) to prevent public access to spcf-log.txt. Organizations should monitor their web server logs for unauthorized access attempts to this path. If possible, disable or replace the StickEasy Protected Contact Form plugin with an alternative that does not expose sensitive logs publicly. Regularly audit WordPress plugins for security issues and ensure all plugins are kept up to date. Implement web application firewalls (WAFs) with rules to block access to known sensitive file paths. Once a patch or update is released by the vendor, apply it promptly. Additionally, organizations should review and minimize the amount of sensitive data logged by plugins and ensure logs are stored securely with proper access controls. Conduct privacy impact assessments to understand the scope of data exposure and notify affected users if required by law.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-03T16:01:21.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901846c9e1ff5ad867f1cb

Added to database: 2/14/2026, 6:37:58 AM

Last enriched: 2/14/2026, 6:38:31 AM

Last updated: 2/21/2026, 12:22:01 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats