Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64369: Missing Authorization in codepeople Contact Form Email

0
Medium
VulnerabilityCVE-2025-64369cvecve-2025-64369
Published: Thu Nov 13 2025 (11/13/2025, 09:24:33 UTC)
Source: CVE Database V5
Vendor/Project: codepeople
Product: Contact Form Email

Description

Missing Authorization vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.58.

AI-Powered Analysis

AILast updated: 11/20/2025, 10:05:24 UTC

Technical Analysis

CVE-2025-64369 identifies a missing authorization vulnerability in the codepeople Contact Form Email plugin, specifically affecting versions up to 1.3.58. The vulnerability arises from incorrectly configured access control security levels, which fail to properly restrict access to the contact form email functionality. This allows an attacker with low privileges (PR:L) to remotely exploit the flaw without requiring user interaction (UI:N). The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), and no impact on integrity or availability, but a high impact on confidentiality (C:H). Essentially, an attacker can access sensitive information submitted through contact forms without proper authorization, leading to potential data leakage. The vulnerability is present in a widely used WordPress plugin that facilitates contact form email functionality, making it relevant for many websites relying on this plugin for customer communication. Although no exploits are currently known in the wild, the vulnerability's nature and ease of exploitation make it a significant risk. The lack of patches at the time of reporting necessitates immediate attention to access controls and user privilege management to mitigate exposure.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive information collected via contact forms, such as personal data, inquiries, or business communications. This can lead to breaches of data protection regulations like GDPR, resulting in legal penalties and reputational damage. Organizations in sectors with high customer interaction through websites—such as e-commerce, finance, healthcare, and public services—are particularly vulnerable. The confidentiality impact could facilitate further targeted attacks or social engineering campaigns. Since the vulnerability does not affect system integrity or availability, the primary concern remains data privacy. The ease of exploitation over the network without user interaction increases the likelihood of automated scanning and exploitation attempts, especially if the plugin is widely deployed without proper access restrictions.

Mitigation Recommendations

1. Monitor the vendor’s official channels for patches addressing CVE-2025-64369 and apply updates promptly once available. 2. Until patches are released, restrict access to the Contact Form Email plugin’s administrative and configuration interfaces to trusted users only, using IP whitelisting or VPN access controls. 3. Review and tighten user privileges in WordPress to ensure only necessary users have access to plugin settings or contact form data. 4. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the contact form endpoints. 5. Conduct regular audits of contact form submissions and access logs to identify unusual access patterns or data exfiltration attempts. 6. Educate site administrators about the risks of misconfigured access controls and the importance of timely patching. 7. Consider alternative contact form plugins with robust security if immediate patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:15.211Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6915aa34dac9b42fc37a58e6

Added to database: 11/13/2025, 9:51:48 AM

Last enriched: 11/20/2025, 10:05:24 AM

Last updated: 11/22/2025, 3:17:15 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats