CVE-2025-64231: Unrestricted Upload of File with Dangerous Type in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database
Unrestricted Upload of File with Dangerous Type vulnerability in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database rtwwcfp-wordpress-contact-form-7-pdf allows Using Malicious Files.This issue affects WordPress Contact Form 7 PDF, Google Sheet & Database: from n/a through <= 3.0.0.
AI Analysis
Technical Summary
CVE-2025-64231 describes a vulnerability in the WordPress plugin 'Contact Form 7 PDF, Google Sheet & Database' developed by RedefiningTheWeb, affecting versions up to and including 3.0.0. The vulnerability is characterized as an unrestricted upload of files with dangerous types, meaning the plugin fails to properly validate or restrict the types of files that users can upload through contact forms. This can allow an attacker to upload malicious files such as web shells, scripts, or executables that can be executed on the server, leading to remote code execution (RCE), full site compromise, or data theft. The vulnerability does not require authentication or user interaction, increasing the risk of automated exploitation. The plugin is used to extend Contact Form 7 functionality by enabling PDF generation, Google Sheet integration, and database storage, making it popular among WordPress users who rely on form data processing. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of WordPress and this plugin make it a critical risk. The lack of a CVSS score indicates the need for an expert severity assessment based on impact and exploitability factors. The vulnerability was reserved in late October 2025 and published in December 2025, with no patch links currently available, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability poses a significant threat to the confidentiality, integrity, and availability of their web assets. Exploitation could lead to unauthorized access to sensitive customer data collected via contact forms, defacement of websites, or use of compromised servers as pivot points for lateral movement within corporate networks. Organizations in sectors such as e-commerce, government, healthcare, and finance that rely on WordPress for public-facing websites are particularly at risk. The unrestricted file upload can facilitate malware deployment, ransomware infection, or data exfiltration, potentially causing regulatory compliance violations under GDPR and resulting in reputational damage and financial losses. The ease of exploitation without authentication increases the likelihood of automated attacks targeting vulnerable sites across Europe. Additionally, the integration features of the plugin (PDF generation, Google Sheets, database storage) mean that attackers could manipulate or intercept data flows, further amplifying the impact.
Mitigation Recommendations
Immediate mitigation steps include disabling the vulnerable plugin until a patch is released. Organizations should monitor their WordPress installations for unusual file uploads or web shell indicators. Implement strict server-side validation to restrict allowed file types and enforce file size limits. Use web application firewalls (WAFs) with rules to detect and block malicious upload attempts targeting this plugin. Regularly audit and update all WordPress plugins and core installations to the latest versions. Employ file integrity monitoring to detect unauthorized changes to web directories. Restrict permissions on upload directories to prevent execution of uploaded files. Additionally, consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential compromises. Educate site administrators on the risks of installing unverified plugins and encourage the use of security plugins that can detect anomalous behavior.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-64231: Unrestricted Upload of File with Dangerous Type in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database
Description
Unrestricted Upload of File with Dangerous Type vulnerability in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database rtwwcfp-wordpress-contact-form-7-pdf allows Using Malicious Files.This issue affects WordPress Contact Form 7 PDF, Google Sheet & Database: from n/a through <= 3.0.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-64231 describes a vulnerability in the WordPress plugin 'Contact Form 7 PDF, Google Sheet & Database' developed by RedefiningTheWeb, affecting versions up to and including 3.0.0. The vulnerability is characterized as an unrestricted upload of files with dangerous types, meaning the plugin fails to properly validate or restrict the types of files that users can upload through contact forms. This can allow an attacker to upload malicious files such as web shells, scripts, or executables that can be executed on the server, leading to remote code execution (RCE), full site compromise, or data theft. The vulnerability does not require authentication or user interaction, increasing the risk of automated exploitation. The plugin is used to extend Contact Form 7 functionality by enabling PDF generation, Google Sheet integration, and database storage, making it popular among WordPress users who rely on form data processing. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of WordPress and this plugin make it a critical risk. The lack of a CVSS score indicates the need for an expert severity assessment based on impact and exploitability factors. The vulnerability was reserved in late October 2025 and published in December 2025, with no patch links currently available, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability poses a significant threat to the confidentiality, integrity, and availability of their web assets. Exploitation could lead to unauthorized access to sensitive customer data collected via contact forms, defacement of websites, or use of compromised servers as pivot points for lateral movement within corporate networks. Organizations in sectors such as e-commerce, government, healthcare, and finance that rely on WordPress for public-facing websites are particularly at risk. The unrestricted file upload can facilitate malware deployment, ransomware infection, or data exfiltration, potentially causing regulatory compliance violations under GDPR and resulting in reputational damage and financial losses. The ease of exploitation without authentication increases the likelihood of automated attacks targeting vulnerable sites across Europe. Additionally, the integration features of the plugin (PDF generation, Google Sheets, database storage) mean that attackers could manipulate or intercept data flows, further amplifying the impact.
Mitigation Recommendations
Immediate mitigation steps include disabling the vulnerable plugin until a patch is released. Organizations should monitor their WordPress installations for unusual file uploads or web shell indicators. Implement strict server-side validation to restrict allowed file types and enforce file size limits. Use web application firewalls (WAFs) with rules to detect and block malicious upload attempts targeting this plugin. Regularly audit and update all WordPress plugins and core installations to the latest versions. Employ file integrity monitoring to detect unauthorized changes to web directories. Restrict permissions on upload directories to prevent execution of uploaded files. Additionally, consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential compromises. Educate site administrators on the risks of installing unverified plugins and encourage the use of security plugins that can detect anomalous behavior.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-29T03:08:07.244Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0534eb3efac36700ab1
Added to database: 12/18/2025, 7:42:11 AM
Last enriched: 12/18/2025, 8:14:33 AM
Last updated: 12/19/2025, 11:17:49 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14847: CWE-130: Improper Handling of Length Parameter Inconsistency in MongoDB Inc. MongoDB Server
HighCVE-2025-14455: CWE-862 Missing Authorization in wpchill Image Photo Gallery Final Tiles Grid
MediumCVE-2025-12361: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.
MediumCVE-2025-66524: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache NiFi
HighCVE-2023-44247: Execute unauthorized code or commands in Fortinet FortiOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.