CVE-2025-47280: CWE-116: Improper Encoding or Escaping of Output in umbraco Umbraco.Forms.Issues
Umbraco Forms is a form builder that integrates with the Umbraco content management system. Starting in the 7.x branch and prior to versions 13.4.2 and 15.1.2, the 'Send email' workflow does not HTML encode the user-provided field values in the sent email message, making any form with this workflow configured vulnerable, as it allows sending the message from a trusted system and address, potentially bypassing spam and email client security systems. This issue affects all (supported) versions Umbraco Forms and is patched in 13.4.2 and 15.1.2. Unpatched or unsupported versions can workaround this issue by using the `Send email with template (Razor)` workflow instead or writing a custom workflow type. To avoid accidentally using the vulnerable workflow again, the `SendEmail` workflow type can be removed using a composer available in the GitHub Security Advisory for this vulnerability.
AI Analysis
Technical Summary
CVE-2025-47280 is a security vulnerability affecting Umbraco Forms, a form builder integrated with the Umbraco content management system (CMS). The vulnerability exists in the 'Send email' workflow of Umbraco Forms versions starting from 7.x up to versions prior to 13.4.2 and 15.1.2. Specifically, the issue arises because the workflow does not HTML encode user-provided field values when sending email messages. This improper encoding or escaping of output (classified under CWE-116) allows malicious input to be included in emails sent from the trusted system. Because the emails originate from a legitimate and trusted source, they can potentially bypass spam filters and email client security mechanisms, increasing the risk of phishing or social engineering attacks. The vulnerability affects all supported versions of Umbraco Forms within the specified version ranges. The issue is mitigated in versions 13.4.2 and 15.1.2, where proper encoding is applied. For unpatched or unsupported versions, a workaround is to use the 'Send email with template (Razor)' workflow or to implement a custom workflow type that ensures proper encoding. Additionally, to prevent accidental use of the vulnerable workflow, the 'SendEmail' workflow type can be removed using a composer script available from the GitHub Security Advisory. The CVSS 4.0 score is 2.3, indicating a low severity, primarily because exploitation requires user interaction and the impact on confidentiality, integrity, and availability is limited to potential phishing or social engineering vectors rather than direct system compromise. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using Umbraco Forms within the affected versions, this vulnerability poses a risk primarily related to email security and trust. Attackers can craft malicious input that, when included in emails sent by the vulnerable workflow, may bypass spam filters and email client protections due to the emails originating from a trusted internal system. This can facilitate phishing campaigns, social engineering attacks, or the delivery of malicious payloads embedded in email content. While the vulnerability does not directly compromise system integrity or availability, the reputational damage and potential data breaches resulting from successful phishing attacks can be significant. Organizations in sectors with high email reliance, such as finance, healthcare, government, and critical infrastructure, may face elevated risks. Furthermore, the vulnerability could be leveraged to target employees or partners, undermining trust in internal communications. Given the widespread use of Umbraco CMS in Europe, especially among small to medium enterprises and public sector websites, the risk is non-negligible. However, the low CVSS score reflects the limited direct technical impact and the requirement for user interaction to exploit the vulnerability.
Mitigation Recommendations
European organizations should prioritize upgrading Umbraco Forms to versions 13.4.2 or 15.1.2 where the vulnerability is patched. For environments where immediate upgrading is not feasible, organizations should switch to using the 'Send email with template (Razor)' workflow, which properly encodes user input, or develop custom workflows that enforce strict HTML encoding of all user-supplied data before inclusion in emails. Additionally, to prevent accidental use of the vulnerable 'SendEmail' workflow, organizations should apply the composer script provided in the GitHub Security Advisory to remove this workflow type from their Umbraco Forms configuration. Email security teams should also enhance monitoring for suspicious email activity originating from internal systems and consider implementing advanced email filtering solutions that analyze email content beyond sender reputation. User awareness training focusing on phishing recognition remains critical. Finally, organizations should audit existing forms and workflows to identify any that use the vulnerable email sending method and remediate accordingly.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Denmark, Belgium, Ireland
CVE-2025-47280: CWE-116: Improper Encoding or Escaping of Output in umbraco Umbraco.Forms.Issues
Description
Umbraco Forms is a form builder that integrates with the Umbraco content management system. Starting in the 7.x branch and prior to versions 13.4.2 and 15.1.2, the 'Send email' workflow does not HTML encode the user-provided field values in the sent email message, making any form with this workflow configured vulnerable, as it allows sending the message from a trusted system and address, potentially bypassing spam and email client security systems. This issue affects all (supported) versions Umbraco Forms and is patched in 13.4.2 and 15.1.2. Unpatched or unsupported versions can workaround this issue by using the `Send email with template (Razor)` workflow instead or writing a custom workflow type. To avoid accidentally using the vulnerable workflow again, the `SendEmail` workflow type can be removed using a composer available in the GitHub Security Advisory for this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-47280 is a security vulnerability affecting Umbraco Forms, a form builder integrated with the Umbraco content management system (CMS). The vulnerability exists in the 'Send email' workflow of Umbraco Forms versions starting from 7.x up to versions prior to 13.4.2 and 15.1.2. Specifically, the issue arises because the workflow does not HTML encode user-provided field values when sending email messages. This improper encoding or escaping of output (classified under CWE-116) allows malicious input to be included in emails sent from the trusted system. Because the emails originate from a legitimate and trusted source, they can potentially bypass spam filters and email client security mechanisms, increasing the risk of phishing or social engineering attacks. The vulnerability affects all supported versions of Umbraco Forms within the specified version ranges. The issue is mitigated in versions 13.4.2 and 15.1.2, where proper encoding is applied. For unpatched or unsupported versions, a workaround is to use the 'Send email with template (Razor)' workflow or to implement a custom workflow type that ensures proper encoding. Additionally, to prevent accidental use of the vulnerable workflow, the 'SendEmail' workflow type can be removed using a composer script available from the GitHub Security Advisory. The CVSS 4.0 score is 2.3, indicating a low severity, primarily because exploitation requires user interaction and the impact on confidentiality, integrity, and availability is limited to potential phishing or social engineering vectors rather than direct system compromise. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using Umbraco Forms within the affected versions, this vulnerability poses a risk primarily related to email security and trust. Attackers can craft malicious input that, when included in emails sent by the vulnerable workflow, may bypass spam filters and email client protections due to the emails originating from a trusted internal system. This can facilitate phishing campaigns, social engineering attacks, or the delivery of malicious payloads embedded in email content. While the vulnerability does not directly compromise system integrity or availability, the reputational damage and potential data breaches resulting from successful phishing attacks can be significant. Organizations in sectors with high email reliance, such as finance, healthcare, government, and critical infrastructure, may face elevated risks. Furthermore, the vulnerability could be leveraged to target employees or partners, undermining trust in internal communications. Given the widespread use of Umbraco CMS in Europe, especially among small to medium enterprises and public sector websites, the risk is non-negligible. However, the low CVSS score reflects the limited direct technical impact and the requirement for user interaction to exploit the vulnerability.
Mitigation Recommendations
European organizations should prioritize upgrading Umbraco Forms to versions 13.4.2 or 15.1.2 where the vulnerability is patched. For environments where immediate upgrading is not feasible, organizations should switch to using the 'Send email with template (Razor)' workflow, which properly encodes user input, or develop custom workflows that enforce strict HTML encoding of all user-supplied data before inclusion in emails. Additionally, to prevent accidental use of the vulnerable 'SendEmail' workflow, organizations should apply the composer script provided in the GitHub Security Advisory to remove this workflow type from their Umbraco Forms configuration. Email security teams should also enhance monitoring for suspicious email activity originating from internal systems and consider implementing advanced email filtering solutions that analyze email content beyond sender reputation. User awareness training focusing on phishing recognition remains critical. Finally, organizations should audit existing forms and workflows to identify any that use the vulnerable email sending method and remediate accordingly.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-05T16:53:10.373Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd5fc1
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/12/2025, 1:17:27 AM
Last updated: 1/7/2026, 4:21:48 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.