Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62915: Missing Authorization in clicksend SMS Contact Form 7 Notifications by ClickSend

0
High
VulnerabilityCVE-2025-62915cvecve-2025-62915
Published: Mon Oct 27 2025 (10/27/2025, 01:33:55 UTC)
Source: CVE Database V5
Vendor/Project: clicksend
Product: SMS Contact Form 7 Notifications by ClickSend

Description

Missing Authorization vulnerability in clicksend SMS Contact Form 7 Notifications by ClickSend clicksend-contactform7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SMS Contact Form 7 Notifications by ClickSend: from n/a through <= 1.4.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:51:23 UTC

Technical Analysis

CVE-2025-62915 identifies a missing authorization vulnerability in the SMS Contact Form 7 Notifications plugin by ClickSend, specifically affecting versions up to and including 1.4.0. This plugin integrates SMS notification capabilities into WordPress sites using the Contact Form 7 plugin, allowing form submissions to trigger SMS alerts. The vulnerability arises from incorrectly configured access control mechanisms, enabling attackers with low privileges (e.g., authenticated users with minimal rights) to bypass authorization checks. This flaw permits unauthorized sending of SMS notifications, potentially leading to information disclosure or manipulation of notification content. The CVSS 3.1 base score is 8.1, reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), while availability remains unaffected (A:N). No public exploits are currently known, but the vulnerability's nature suggests it could be leveraged for phishing, spam, or social engineering attacks by sending unauthorized messages. The plugin's role in critical communications makes this vulnerability particularly concerning for organizations relying on SMS alerts for operational or security notifications. The issue was reserved on October 24, 2025, and published on October 27, 2025, with no patch links yet available, indicating that remediation is pending. The vulnerability affects WordPress sites using this plugin, which is popular in various regions, including Europe.

Potential Impact

For European organizations, the impact of CVE-2025-62915 can be significant, especially for those using WordPress with the SMS Contact Form 7 Notifications plugin to manage customer communications, alerts, or internal notifications. Unauthorized SMS sending can lead to leakage of sensitive information, manipulation of message content, and reputational damage if attackers send fraudulent or misleading messages. This could facilitate phishing campaigns, social engineering attacks, or unauthorized disclosure of personal data, potentially violating GDPR and other data protection regulations. The integrity of communication channels is compromised, undermining trust in automated notification systems. Although availability is not directly impacted, the indirect effects on business operations and compliance can be substantial. Organizations in sectors such as finance, healthcare, and government, which often rely on SMS for multi-factor authentication or critical alerts, face heightened risks. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Monitor official ClickSend and WordPress plugin repositories for security updates and apply patches immediately once available. 2. Until a patch is released, restrict access to WordPress admin interfaces to trusted IP addresses and enforce strong authentication mechanisms, including multi-factor authentication. 3. Review and tighten user role permissions within WordPress to minimize the number of users with privileges that could exploit this vulnerability. 4. Implement network-level controls such as web application firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable plugin endpoints. 5. Audit SMS sending logs for unusual or unauthorized activity to detect potential exploitation attempts early. 6. Educate staff and users about the risks of phishing and social engineering attacks that could leverage unauthorized SMS messages. 7. Consider temporarily disabling the SMS Contact Form 7 Notifications plugin if SMS functionality is not critical, until a secure version is available. 8. Conduct regular security assessments and penetration testing focusing on WordPress plugins and their access control configurations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:30.143Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed03023a7bbed324acbbb

Added to database: 10/27/2025, 1:51:44 AM

Last enriched: 1/20/2026, 10:51:23 PM

Last updated: 2/3/2026, 4:23:56 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats