Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64231: Unrestricted Upload of File with Dangerous Type in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database

0
Critical
VulnerabilityCVE-2025-64231cvecve-2025-64231
Published: Thu Dec 18 2025 (12/18/2025, 07:22:13 UTC)
Source: CVE Database V5
Vendor/Project: RedefiningTheWeb
Product: WordPress Contact Form 7 PDF, Google Sheet & Database

Description

Unrestricted Upload of File with Dangerous Type vulnerability in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database rtwwcfp-wordpress-contact-form-7-pdf allows Using Malicious Files.This issue affects WordPress Contact Form 7 PDF, Google Sheet & Database: from n/a through <= 3.0.0.

AI-Powered Analysis

AILast updated: 12/18/2025, 08:14:33 UTC

Technical Analysis

CVE-2025-64231 describes a vulnerability in the WordPress plugin 'Contact Form 7 PDF, Google Sheet & Database' developed by RedefiningTheWeb, affecting versions up to and including 3.0.0. The vulnerability is characterized as an unrestricted upload of files with dangerous types, meaning the plugin fails to properly validate or restrict the types of files that users can upload through contact forms. This can allow an attacker to upload malicious files such as web shells, scripts, or executables that can be executed on the server, leading to remote code execution (RCE), full site compromise, or data theft. The vulnerability does not require authentication or user interaction, increasing the risk of automated exploitation. The plugin is used to extend Contact Form 7 functionality by enabling PDF generation, Google Sheet integration, and database storage, making it popular among WordPress users who rely on form data processing. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of WordPress and this plugin make it a critical risk. The lack of a CVSS score indicates the need for an expert severity assessment based on impact and exploitability factors. The vulnerability was reserved in late October 2025 and published in December 2025, with no patch links currently available, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the confidentiality, integrity, and availability of their web assets. Exploitation could lead to unauthorized access to sensitive customer data collected via contact forms, defacement of websites, or use of compromised servers as pivot points for lateral movement within corporate networks. Organizations in sectors such as e-commerce, government, healthcare, and finance that rely on WordPress for public-facing websites are particularly at risk. The unrestricted file upload can facilitate malware deployment, ransomware infection, or data exfiltration, potentially causing regulatory compliance violations under GDPR and resulting in reputational damage and financial losses. The ease of exploitation without authentication increases the likelihood of automated attacks targeting vulnerable sites across Europe. Additionally, the integration features of the plugin (PDF generation, Google Sheets, database storage) mean that attackers could manipulate or intercept data flows, further amplifying the impact.

Mitigation Recommendations

Immediate mitigation steps include disabling the vulnerable plugin until a patch is released. Organizations should monitor their WordPress installations for unusual file uploads or web shell indicators. Implement strict server-side validation to restrict allowed file types and enforce file size limits. Use web application firewalls (WAFs) with rules to detect and block malicious upload attempts targeting this plugin. Regularly audit and update all WordPress plugins and core installations to the latest versions. Employ file integrity monitoring to detect unauthorized changes to web directories. Restrict permissions on upload directories to prevent execution of uploaded files. Additionally, consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential compromises. Educate site administrators on the risks of installing unverified plugins and encourage the use of security plugins that can detect anomalous behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:08:07.244Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0534eb3efac36700ab1

Added to database: 12/18/2025, 7:42:11 AM

Last enriched: 12/18/2025, 8:14:33 AM

Last updated: 12/19/2025, 11:17:49 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats