CVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7
The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server.
AI Analysis
Technical Summary
CVE-2025-14800 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the themeisle Redirection for Contact Form 7 plugin for WordPress. The vulnerability arises from the 'move_file_to_upload' function lacking proper file type validation, allowing unauthenticated attackers to upload arbitrary files to the server hosting the WordPress site. This flaw affects all versions up to and including 3.2.7. The absence of validation means attackers can upload potentially malicious files, including web shells or scripts, which can be executed on the server. If the PHP configuration directive 'allow_url_fopen' is enabled, attackers can upload remote files directly, increasing the attack surface. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it highly dangerous. The impact includes full compromise of the server's confidentiality, integrity, and availability, as attackers can execute arbitrary code, deface websites, or disrupt services. Although no exploits are currently known in the wild, the high CVSS score of 8.1 indicates a critical risk. The vulnerability was published on December 21, 2025, and no patches or updates are currently listed, emphasizing the need for immediate attention. The plugin is widely used in WordPress environments, which are prevalent in European organizations for web presence and customer interaction.
Potential Impact
The vulnerability allows attackers to upload arbitrary files, potentially leading to remote code execution, data theft, website defacement, or denial of service. For European organizations, this can result in significant operational disruption, reputational damage, and regulatory non-compliance, especially under GDPR if personal data is compromised. Public-facing WordPress sites using the affected plugin are particularly vulnerable, as attackers do not need authentication or user interaction to exploit the flaw. The ability to upload remote files if 'allow_url_fopen' is enabled further exacerbates the risk, allowing attackers to bypass local file restrictions. This can lead to widespread compromise of web servers, impacting business continuity and customer trust. The high CVSS score reflects the severity and ease of exploitation, making it a critical threat for organizations relying on this plugin for form redirection and management.
Mitigation Recommendations
1. Immediately monitor for plugin updates from themeisle and apply patches as soon as they are released. 2. Temporarily disable or remove the Redirection for Contact Form 7 plugin if patching is not immediately possible. 3. Disable the PHP 'allow_url_fopen' directive in the server configuration to prevent remote file uploads. 4. Implement strict file upload validation and filtering at the web server or application firewall level to block dangerous file types. 5. Conduct regular security audits and file integrity monitoring to detect unauthorized file uploads. 6. Restrict permissions on upload directories to prevent execution of uploaded files. 7. Use Web Application Firewalls (WAFs) with rules targeting file upload anomalies related to this plugin. 8. Educate site administrators on secure plugin management and the risks of outdated components. 9. Employ network segmentation to limit the impact of a compromised web server. 10. Maintain regular backups of website data and configurations to enable rapid recovery.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7
Description
The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server.
AI-Powered Analysis
Technical Analysis
CVE-2025-14800 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the themeisle Redirection for Contact Form 7 plugin for WordPress. The vulnerability arises from the 'move_file_to_upload' function lacking proper file type validation, allowing unauthenticated attackers to upload arbitrary files to the server hosting the WordPress site. This flaw affects all versions up to and including 3.2.7. The absence of validation means attackers can upload potentially malicious files, including web shells or scripts, which can be executed on the server. If the PHP configuration directive 'allow_url_fopen' is enabled, attackers can upload remote files directly, increasing the attack surface. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it highly dangerous. The impact includes full compromise of the server's confidentiality, integrity, and availability, as attackers can execute arbitrary code, deface websites, or disrupt services. Although no exploits are currently known in the wild, the high CVSS score of 8.1 indicates a critical risk. The vulnerability was published on December 21, 2025, and no patches or updates are currently listed, emphasizing the need for immediate attention. The plugin is widely used in WordPress environments, which are prevalent in European organizations for web presence and customer interaction.
Potential Impact
The vulnerability allows attackers to upload arbitrary files, potentially leading to remote code execution, data theft, website defacement, or denial of service. For European organizations, this can result in significant operational disruption, reputational damage, and regulatory non-compliance, especially under GDPR if personal data is compromised. Public-facing WordPress sites using the affected plugin are particularly vulnerable, as attackers do not need authentication or user interaction to exploit the flaw. The ability to upload remote files if 'allow_url_fopen' is enabled further exacerbates the risk, allowing attackers to bypass local file restrictions. This can lead to widespread compromise of web servers, impacting business continuity and customer trust. The high CVSS score reflects the severity and ease of exploitation, making it a critical threat for organizations relying on this plugin for form redirection and management.
Mitigation Recommendations
1. Immediately monitor for plugin updates from themeisle and apply patches as soon as they are released. 2. Temporarily disable or remove the Redirection for Contact Form 7 plugin if patching is not immediately possible. 3. Disable the PHP 'allow_url_fopen' directive in the server configuration to prevent remote file uploads. 4. Implement strict file upload validation and filtering at the web server or application firewall level to block dangerous file types. 5. Conduct regular security audits and file integrity monitoring to detect unauthorized file uploads. 6. Restrict permissions on upload directories to prevent execution of uploaded files. 7. Use Web Application Firewalls (WAFs) with rules targeting file upload anomalies related to this plugin. 8. Educate site administrators on secure plugin management and the risks of outdated components. 9. Employ network segmentation to limit the impact of a compromised web server. 10. Maintain regular backups of website data and configurations to enable rapid recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-16T20:20:41.998Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6947a34f3cbe12b6f34a58cc
Added to database: 12/21/2025, 7:35:43 AM
Last enriched: 12/21/2025, 7:36:30 AM
Last updated: 12/21/2025, 10:27:02 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14994: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14855: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brainstormforce SureForms – Contact Form, Payment Form & Other Custom Form Builder
HighCVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18
HighCVE-2025-14992: Stack-based Buffer Overflow in Tenda AC18
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.