Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7340: CWE-434 Unrestricted Upload of File with Dangerous Type in htplugins HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder.

0
Critical
VulnerabilityCVE-2025-7340cvecve-2025-7340cwe-434
Published: Tue Jul 15 2025 (07/15/2025, 04:23:42 UTC)
Source: CVE Database V5
Vendor/Project: htplugins
Product: HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder.

Description

The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:05:08 UTC

Technical Analysis

CVE-2025-7340 is a critical security vulnerability identified in the HT Contact Form Widget for Elementor Page Builder & Gutenberg Blocks & Form Builder WordPress plugin. The root cause is a lack of proper file type validation in the temp_file_upload function, which allows unauthenticated attackers to upload arbitrary files to the server hosting the vulnerable WordPress site. This vulnerability is classified under CWE-434, which pertains to unrestricted file upload of dangerous types. Because the plugin does not restrict or validate the types of files uploaded, attackers can upload malicious payloads such as web shells or scripts that enable remote code execution (RCE). Exploitation requires no authentication or user interaction, making it trivially exploitable over the network. The vulnerability affects all versions up to and including 2.2.1 of the plugin. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the severity and ease of exploitation make it a high-risk threat. The vulnerability could allow attackers to gain full control over the affected web server, leading to data theft, defacement, malware distribution, or pivoting to internal networks. Given the widespread use of WordPress and the popularity of Elementor and Gutenberg page builders, the attack surface is extensive. The absence of patches at the time of reporting necessitates immediate mitigation efforts by administrators.

Potential Impact

The impact of CVE-2025-7340 is severe and multifaceted. Successful exploitation enables attackers to upload arbitrary files, including malicious scripts, leading to remote code execution on the web server. This compromises the confidentiality of sensitive data stored or processed by the website, including user information and credentials. Integrity is affected as attackers can modify website content, inject malicious code, or deface the site. Availability may be disrupted if attackers deploy ransomware, delete files, or cause service outages. Additionally, compromised servers can be used as a foothold for lateral movement within an organization's network, potentially exposing internal systems. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of widespread attacks. Organizations relying on this plugin risk data breaches, reputational damage, regulatory penalties, and operational disruptions. The threat is particularly critical for e-commerce, financial, healthcare, and government websites where data sensitivity and uptime are paramount.

Mitigation Recommendations

To mitigate CVE-2025-7340, organizations should take the following specific actions: 1) Immediately update the HT Contact Form Widget plugin to a patched version once released by the vendor. Monitor vendor communications for official patches. 2) If a patch is not yet available, temporarily disable or remove the vulnerable plugin to eliminate the attack vector. 3) Implement web application firewall (WAF) rules to block file uploads with suspicious or executable extensions such as .php, .phtml, .exe, .js, and others. 4) Restrict file upload directories with strict permissions and disable execution of uploaded files by configuring the web server (e.g., using .htaccess to deny script execution in upload folders). 5) Employ content security policies and input validation to detect and block malicious payloads. 6) Conduct regular security scans and monitoring for unusual file uploads or web shell indicators. 7) Harden WordPress installations by limiting plugin usage to trusted sources and maintaining least privilege principles for user accounts. 8) Educate site administrators about the risks of unrestricted file uploads and the importance of timely patching. 9) Maintain comprehensive backups and incident response plans to recover quickly in case of compromise. These targeted measures go beyond generic advice and address the specific exploitation vector of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-07T20:29:32.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6875d989a83201eaacccacf3

Added to database: 7/15/2025, 4:31:05 AM

Last enriched: 2/26/2026, 4:05:08 PM

Last updated: 3/21/2026, 6:11:27 AM

Views: 177

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses