Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14356: CWE-639 Authorization Bypass Through User-Controlled Key in themefic Ultra Addons for Contact Form 7

0
Medium
VulnerabilityCVE-2025-14356cvecve-2025-14356cwe-639
Published: Fri Dec 12 2025 (12/12/2025, 06:32:57 UTC)
Source: CVE Database V5
Vendor/Project: themefic
Product: Ultra Addons for Contact Form 7

Description

The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'uacf7_get_generated_pdf' function in all versions up to, and including, 3.5.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate and get form submission PDF, when the "PDF Generator" and the "Database" addons are enabled (disabled by default).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:07:12 UTC

Technical Analysis

CVE-2025-14356 is an authorization bypass vulnerability identified in the Ultra Addons for Contact Form 7 plugin for WordPress, specifically affecting all versions up to 3.5.33. The root cause is a missing capability check in the 'uacf7_get_generated_pdf' function, which is responsible for generating PDF documents of form submissions. This flaw allows any authenticated user with at least Subscriber-level privileges to invoke this function and obtain PDFs of form submissions, bypassing intended access controls. The vulnerability manifests only when both the "PDF Generator" and "Database" addons are enabled, which are disabled by default, limiting the attack surface. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), indicating that the authorization mechanism can be circumvented by manipulating user-controlled inputs. The CVSS v3.1 base score is 4.3 (medium), reflecting network attack vector, low attack complexity, and low privileges required, with no user interaction needed. No known exploits have been reported in the wild as of publication. The vulnerability could expose sensitive user-submitted data collected via Contact Form 7 forms, potentially leading to privacy violations or data leakage. The plugin is widely used in WordPress environments, making this a relevant concern for many websites that rely on these addons for PDF generation and data storage.

Potential Impact

The primary impact of CVE-2025-14356 is unauthorized disclosure of form submission data, which may include personally identifiable information, contact details, or other sensitive inputs collected via Contact Form 7 forms. Attackers with minimal privileges (Subscriber-level) can exploit this vulnerability to access data they should not be authorized to view, potentially violating user privacy and data protection regulations such as GDPR. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone can damage organizational reputation and trust. For organizations handling sensitive or regulated data, this could lead to compliance issues and legal liabilities. The vulnerability affects any WordPress site using the Ultra Addons for Contact Form 7 plugin with the PDF Generator and Database addons enabled, which could include a broad range of businesses, nonprofits, and government websites. The ease of exploitation and network accessibility mean attackers can remotely leverage this flaw once authenticated, increasing the risk of insider threats or compromised low-privilege accounts being used as attack vectors.

Mitigation Recommendations

To mitigate CVE-2025-14356, organizations should immediately verify if the Ultra Addons for Contact Form 7 plugin is installed and check the version; upgrading to a patched version once available is the most effective solution. Until a patch is released, administrators should disable the "PDF Generator" and "Database" addons if they are not essential, as these are disabled by default and their activation is required for exploitation. Review and restrict user roles and permissions to minimize the number of accounts with Subscriber-level or higher access, implementing the principle of least privilege. Monitor logs for unusual access patterns to PDF generation endpoints, especially from accounts with minimal privileges. Consider implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the vulnerable function. Additionally, conduct regular audits of form submission data access and ensure backups are securely stored. Finally, educate site administrators about the risk and encourage prompt application of security updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T16:40:32.811Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bbde4e6d9263eb354938b

Added to database: 12/12/2025, 7:01:56 AM

Last enriched: 2/27/2026, 11:07:12 AM

Last updated: 3/26/2026, 9:22:43 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses