Skip to main content

CVE-2025-24772: CWE-352 Cross-Site Request Forgery (CSRF) in cmsMinds Pay with Contact Form 7

Medium
VulnerabilityCVE-2025-24772cvecve-2025-24772cwe-352
Published: Fri Jun 06 2025 (06/06/2025, 12:54:39 UTC)
Source: CVE Database V5
Vendor/Project: cmsMinds
Product: Pay with Contact Form 7

Description

Cross-Site Request Forgery (CSRF) vulnerability in cmsMinds Pay with Contact Form 7 allows Cross Site Request Forgery. This issue affects Pay with Contact Form 7: from n/a through 1.0.4.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:57:02 UTC

Technical Analysis

CVE-2025-24772 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'Pay with Contact Form 7' developed by cmsMinds. This plugin integrates payment capabilities with the widely used Contact Form 7 plugin, allowing users to process payments via forms on WordPress sites. The vulnerability affects versions up to 1.0.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing unintended actions without the user's consent. In this case, the vulnerability allows an attacker to craft malicious requests that, when executed by an authenticated user, can alter payment-related operations or configurations within the plugin. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact affects integrity and availability but not confidentiality, meaning attackers can potentially manipulate payment processes or disrupt service but cannot directly access sensitive data. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to CSRF attacks. Given the plugin's integration with payment processing, successful exploitation could lead to unauthorized transactions or denial of service within the payment workflow.

Potential Impact

For European organizations using WordPress websites with the 'Pay with Contact Form 7' plugin, this vulnerability poses a risk to the integrity and availability of payment processing functions. Attackers could exploit the CSRF flaw to initiate unauthorized payment actions or disrupt payment workflows, potentially leading to financial losses, customer dissatisfaction, and reputational damage. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick administrators or users with elevated privileges into triggering malicious requests. The impact is particularly significant for e-commerce businesses, non-profits, or service providers relying on Contact Form 7 for payment collection. Additionally, disruption of payment services could contravene European regulations such as PSD2, which mandates secure payment processing. While confidentiality is not directly impacted, indirect effects such as loss of customer trust and regulatory scrutiny could arise. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is public.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the 'Pay with Contact Form 7' plugin and verify its version. Until an official patch is released, administrators should consider disabling or removing the plugin to eliminate exposure. Implementing web application firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide interim protection. Organizations should enforce strict user access controls, limiting administrative privileges to trusted personnel and educating users about phishing and social engineering risks to reduce the chance of malicious user interactions. Additionally, enabling multi-factor authentication (MFA) for WordPress admin accounts can mitigate the risk of unauthorized actions. Monitoring logs for unusual payment-related activities and setting up alerts for anomalous form submissions can help detect exploitation attempts early. Once a patch becomes available, prompt application of updates is critical. Developers and site owners should also review the plugin’s source code for CSRF protections, such as nonce verification, and consider contributing fixes or using alternative plugins with robust security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:53:16.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842edd971f4d251b5c87f0a

Added to database: 6/6/2025, 1:32:09 PM

Last enriched: 7/8/2025, 8:57:02 AM

Last updated: 8/2/2025, 10:34:05 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats