Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14356: CWE-639 Authorization Bypass Through User-Controlled Key in themefic Ultra Addons for Contact Form 7

0
Medium
VulnerabilityCVE-2025-14356cvecve-2025-14356cwe-639
Published: Fri Dec 12 2025 (12/12/2025, 06:32:57 UTC)
Source: CVE Database V5
Vendor/Project: themefic
Product: Ultra Addons for Contact Form 7

Description

The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'uacf7_get_generated_pdf' function in all versions up to, and including, 3.5.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate and get form submission PDF, when the "PDF Generator" and the "Database" addons are enabled (disabled by default).

AI-Powered Analysis

AILast updated: 12/12/2025, 07:17:38 UTC

Technical Analysis

The vulnerability CVE-2025-14356 affects the Ultra Addons for Contact Form 7 plugin for WordPress, specifically all versions up to and including 3.5.33. The root cause is a missing capability check in the 'uacf7_get_generated_pdf' function, which is responsible for generating PDF versions of form submissions. This function can be invoked by authenticated users with Subscriber-level privileges or higher, allowing them to bypass authorization controls and access PDF documents containing potentially sensitive form data. The exploit requires that both the "PDF Generator" and "Database" addons are enabled, which are disabled by default, reducing the attack surface. The vulnerability is categorized under CWE-639, indicating an authorization bypass due to improper validation of user-controlled keys. The attack vector is network-based, requiring authentication but no user interaction, and the vulnerability does not affect data integrity or system availability, only confidentiality to a limited extent. No patches are currently linked, and no known exploits have been observed in the wild. The CVSS 3.1 base score is 4.3 (medium), reflecting the moderate risk posed by unauthorized data disclosure. This vulnerability is particularly relevant for organizations using Contact Form 7 with the Ultra Addons plugin and the specified addons enabled, as it could lead to unauthorized access to form submission data, which may include personal or sensitive information.

Potential Impact

For European organizations, the primary impact of CVE-2025-14356 is unauthorized disclosure of form submission data, which could include personal data protected under GDPR. This exposure risks violating data protection regulations, leading to potential fines and reputational damage. Since the vulnerability allows Subscriber-level users to access PDFs without proper authorization, insider threats or compromised low-privilege accounts could exploit this flaw to harvest sensitive information. The impact on system integrity and availability is negligible, but confidentiality breaches could affect customer trust and compliance status. Organizations relying heavily on Contact Form 7 for customer interactions, surveys, or data collection are at higher risk. The requirement that both the "PDF Generator" and "Database" addons be enabled limits the scope but does not eliminate risk, especially if these features are used to automate document generation and storage. The lack of known exploits suggests limited active targeting currently, but the vulnerability could be weaponized if disclosed publicly or reverse-engineered. Overall, the threat is moderate but significant for data privacy and regulatory compliance in Europe.

Mitigation Recommendations

European organizations should first verify whether the Ultra Addons for Contact Form 7 plugin is installed and which version is in use. If the version is 3.5.33 or earlier, immediate action is recommended. Since no official patch links are provided, organizations should monitor the vendor's site and trusted vulnerability databases for updates or patches. In the interim, disable the "PDF Generator" and "Database" addons if they are enabled, as these are prerequisites for exploitation. Restrict Subscriber-level user accounts and review user privileges to minimize the number of users who can authenticate with such roles. Implement strict access controls and monitor logs for unusual PDF generation requests. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious calls to the 'uacf7_get_generated_pdf' function endpoint. Conduct internal audits of form submission data access and ensure that sensitive data is encrypted at rest and in transit. Finally, educate administrators and users about the risk and encourage prompt updates once patches become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T16:40:32.811Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bbde4e6d9263eb354938b

Added to database: 12/12/2025, 7:01:56 AM

Last enriched: 12/12/2025, 7:17:38 AM

Last updated: 12/12/2025, 10:35:18 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats