Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64231: Unrestricted Upload of File with Dangerous Type in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database

0
Critical
VulnerabilityCVE-2025-64231cvecve-2025-64231
Published: Thu Dec 18 2025 (12/18/2025, 07:22:13 UTC)
Source: CVE Database V5
Vendor/Project: RedefiningTheWeb
Product: WordPress Contact Form 7 PDF, Google Sheet & Database

Description

Unrestricted Upload of File with Dangerous Type vulnerability in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database rtwwcfp-wordpress-contact-form-7-pdf allows Using Malicious Files.This issue affects WordPress Contact Form 7 PDF, Google Sheet & Database: from n/a through <= 3.0.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:47:12 UTC

Technical Analysis

CVE-2025-64231 is a critical security vulnerability identified in the WordPress plugin 'Contact Form 7 PDF, Google Sheet & Database' developed by RedefiningTheWeb. The vulnerability stems from an unrestricted file upload flaw that allows attackers to upload files of dangerous types without any authentication or user interaction. This means malicious actors can directly upload executable scripts or other harmful files through the plugin's file upload functionality. The plugin versions affected include all versions up to and including 3.0.0. The CVSS v3.1 base score of 9.8 reflects the vulnerability's critical nature, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Exploiting this vulnerability could allow remote code execution on the hosting server, enabling attackers to take full control of the affected WordPress site, steal sensitive data, modify or delete content, and disrupt service availability. The vulnerability was reserved in late October 2025 and published in December 2025, with no known public exploits at the time of reporting. The lack of patch links suggests that a fix may not yet be available, underscoring the urgency for affected users to monitor vendor communications and apply updates promptly once released. The unrestricted upload issue likely arises from insufficient validation or sanitization of uploaded files, a common weakness in web applications that handle user-generated content. Given the widespread use of WordPress and the popularity of Contact Form 7 plugins, this vulnerability poses a significant risk to many websites worldwide.

Potential Impact

For European organizations, the impact of CVE-2025-64231 can be severe. Many businesses, government agencies, and non-profits in Europe rely on WordPress for their web presence, often using Contact Form 7 and related plugins to manage user interactions and data collection. Successful exploitation could lead to unauthorized access to sensitive customer or internal data, disruption of online services, reputational damage, and potential regulatory penalties under GDPR due to data breaches. The ability to execute arbitrary code remotely means attackers could implant backdoors, launch further attacks within the network, or use compromised sites as part of larger botnets or phishing campaigns. Organizations in sectors such as e-commerce, finance, healthcare, and public administration are particularly vulnerable due to the sensitive nature of their data and the criticality of their online services. Additionally, the ease of exploitation without authentication or user interaction increases the likelihood of automated attacks targeting vulnerable sites across Europe.

Mitigation Recommendations

Immediate mitigation steps include monitoring official RedefiningTheWeb channels for patches and applying updates as soon as they become available. Until a patch is released, administrators should disable or restrict file upload functionality within the plugin if possible. Implementing Web Application Firewalls (WAFs) with rules to block suspicious file uploads and scanning uploaded files for malicious content can reduce risk. Restricting file types allowed for upload to only safe formats (e.g., PDFs, images) and enforcing strict MIME type and extension validation is critical. Server-side controls such as disabling execution permissions in upload directories, isolating the WordPress environment, and employing least privilege principles for web server processes can limit the impact of a successful exploit. Regular security audits and monitoring for unusual activity, including unexpected file changes or new files in upload directories, will help detect exploitation attempts early. Organizations should also review backup and incident response plans to ensure rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:08:07.244Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0534eb3efac36700ab1

Added to database: 12/18/2025, 7:42:11 AM

Last enriched: 1/20/2026, 11:47:12 PM

Last updated: 2/4/2026, 7:30:28 AM

Views: 197

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats