Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67471: Cross-Site Request Forgery (CSRF) in Saad Iqbal Quick Contact Form

0
High
VulnerabilityCVE-2025-67471cvecve-2025-67471
Published: Tue Dec 09 2025 (12/09/2025, 14:13:56 UTC)
Source: CVE Database V5
Vendor/Project: Saad Iqbal
Product: Quick Contact Form

Description

Cross-Site Request Forgery (CSRF) vulnerability in Saad Iqbal Quick Contact Form quick-contact-form allows Cross Site Request Forgery.This issue affects Quick Contact Form: from n/a through <= 8.2.5.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:46:16 UTC

Technical Analysis

CVE-2025-67471 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Saad Iqbal Quick Contact Form plugin, affecting all versions up to and including 8.2.5. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request to a web application without their consent, exploiting the user's active session. In this case, the Quick Contact Form plugin lacks proper CSRF protections such as anti-CSRF tokens or origin checks, allowing remote attackers to craft malicious web pages or emails that, when visited or interacted with by a user, cause unintended actions on the vulnerable site. The CVSS 3.1 score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates that the attack can be performed remotely over the network without privileges, requires user interaction (e.g., clicking a link), and can fully compromise confidentiality, integrity, and availability of the affected system. The vulnerability is particularly dangerous because it can lead to unauthorized data submission, modification, or deletion via the contact form, potentially exposing sensitive information or disrupting communications. Although no public exploits are currently reported, the widespread use of this plugin in WordPress environments increases the risk of exploitation once a proof-of-concept or exploit code becomes available. The vulnerability was published on December 9, 2025, and no patches or fixes have been linked yet, indicating that organizations must proactively implement mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-67471 can be significant, especially for those relying on WordPress websites with the Quick Contact Form plugin for customer communications, lead generation, or support. Exploitation could allow attackers to submit fraudulent or malicious data, manipulate contact form submissions, or disrupt service availability, undermining trust and potentially leading to data breaches involving personal or sensitive information. This could result in regulatory non-compliance under GDPR due to unauthorized data processing or exposure. Additionally, attackers could leverage the compromised form to pivot into further attacks against the web infrastructure or users. The high severity and ease of remote exploitation mean that organizations with public-facing websites are at elevated risk. The absence of known exploits currently provides a window for mitigation, but the threat landscape could rapidly evolve. The reputational damage and operational disruption caused by such an attack could be substantial, particularly for sectors like finance, healthcare, and e-commerce prevalent in Europe.

Mitigation Recommendations

1. Monitor the Saad Iqbal vendor channels and trusted vulnerability databases for official patches or updates addressing CVE-2025-67471 and apply them immediately upon release. 2. Implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting the Quick Contact Form endpoints. 3. Enforce strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF exploitation. 4. If patching is delayed, consider temporarily disabling the Quick Contact Form plugin or replacing it with a secure alternative that includes built-in CSRF protections. 5. Conduct security audits of the website to ensure all forms implement anti-CSRF tokens and validate the origin of requests. 6. Educate users and administrators about the risks of clicking unknown links or visiting untrusted websites while authenticated to sensitive web applications. 7. Restrict form submission endpoints to accept requests only from trusted referrers or authenticated sessions where feasible. 8. Regularly review web server and application logs for anomalous form submission activity indicative of CSRF attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-08T16:00:53.489Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833a029cea75c35ae51f4

Added to database: 12/9/2025, 2:35:12 PM

Last enriched: 1/21/2026, 12:46:16 AM

Last updated: 2/7/2026, 8:19:30 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats