Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7

0
High
VulnerabilityCVE-2025-14800cvecve-2025-14800cwe-434
Published: Sun Dec 21 2025 (12/21/2025, 07:31:11 UTC)
Source: CVE Database V5
Vendor/Project: themeisle
Product: Redirection for Contact Form 7

Description

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server.

AI-Powered Analysis

AILast updated: 12/21/2025, 07:36:30 UTC

Technical Analysis

CVE-2025-14800 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the themeisle Redirection for Contact Form 7 plugin for WordPress. The vulnerability arises from the 'move_file_to_upload' function lacking proper file type validation, allowing unauthenticated attackers to upload arbitrary files to the server hosting the WordPress site. This flaw affects all versions up to and including 3.2.7. The absence of validation means attackers can upload potentially malicious files, including web shells or scripts, which can be executed on the server. If the PHP configuration directive 'allow_url_fopen' is enabled, attackers can upload remote files directly, increasing the attack surface. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it highly dangerous. The impact includes full compromise of the server's confidentiality, integrity, and availability, as attackers can execute arbitrary code, deface websites, or disrupt services. Although no exploits are currently known in the wild, the high CVSS score of 8.1 indicates a critical risk. The vulnerability was published on December 21, 2025, and no patches or updates are currently listed, emphasizing the need for immediate attention. The plugin is widely used in WordPress environments, which are prevalent in European organizations for web presence and customer interaction.

Potential Impact

The vulnerability allows attackers to upload arbitrary files, potentially leading to remote code execution, data theft, website defacement, or denial of service. For European organizations, this can result in significant operational disruption, reputational damage, and regulatory non-compliance, especially under GDPR if personal data is compromised. Public-facing WordPress sites using the affected plugin are particularly vulnerable, as attackers do not need authentication or user interaction to exploit the flaw. The ability to upload remote files if 'allow_url_fopen' is enabled further exacerbates the risk, allowing attackers to bypass local file restrictions. This can lead to widespread compromise of web servers, impacting business continuity and customer trust. The high CVSS score reflects the severity and ease of exploitation, making it a critical threat for organizations relying on this plugin for form redirection and management.

Mitigation Recommendations

1. Immediately monitor for plugin updates from themeisle and apply patches as soon as they are released. 2. Temporarily disable or remove the Redirection for Contact Form 7 plugin if patching is not immediately possible. 3. Disable the PHP 'allow_url_fopen' directive in the server configuration to prevent remote file uploads. 4. Implement strict file upload validation and filtering at the web server or application firewall level to block dangerous file types. 5. Conduct regular security audits and file integrity monitoring to detect unauthorized file uploads. 6. Restrict permissions on upload directories to prevent execution of uploaded files. 7. Use Web Application Firewalls (WAFs) with rules targeting file upload anomalies related to this plugin. 8. Educate site administrators on secure plugin management and the risks of outdated components. 9. Employ network segmentation to limit the impact of a compromised web server. 10. Maintain regular backups of website data and configurations to enable rapid recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-16T20:20:41.998Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6947a34f3cbe12b6f34a58cc

Added to database: 12/21/2025, 7:35:43 AM

Last enriched: 12/21/2025, 7:36:30 AM

Last updated: 12/21/2025, 10:27:02 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats