Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7341: CWE-269 Improper Privilege Management in htplugins HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder.

0
Critical
VulnerabilityCVE-2025-7341cvecve-2025-7341cwe-269
Published: Tue Jul 15 2025 (07/15/2025, 04:23:40 UTC)
Source: CVE Database V5
Vendor/Project: htplugins
Product: HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder.

Description

The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the temp_file_delete() function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:05:27 UTC

Technical Analysis

CVE-2025-7341 is a critical security vulnerability identified in the HT Contact Form Widget for Elementor Page Builder & Gutenberg Blocks & Form Builder WordPress plugin. The root cause is improper privilege management (CWE-269) due to insufficient validation of file paths in the temp_file_delete() function. This flaw allows unauthenticated attackers to invoke arbitrary file deletion on the hosting server. Because the function does not properly validate or sanitize the file path input, attackers can specify any file path, leading to deletion of critical files such as wp-config.php, which contains database credentials and configuration settings. Deletion of such files can disrupt website availability and enable remote code execution by facilitating further exploitation or site takeover. The vulnerability affects all plugin versions up to and including 2.2.1. The CVSS v3.1 base score is 9.1, reflecting the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and high availability impact (A:H). Although no public exploits are currently known, the vulnerability's characteristics make it highly exploitable. The plugin is widely used in WordPress environments globally, especially in regions with high WordPress market share. This vulnerability poses a significant risk to website integrity and availability, potentially leading to full site compromise if exploited.

Potential Impact

The vulnerability allows unauthenticated attackers to delete arbitrary files on the web server hosting the vulnerable WordPress plugin. This can lead to severe consequences including denial of service by deleting critical files, disruption of website functionality, and potential remote code execution if attackers delete configuration files like wp-config.php. The loss of wp-config.php can expose database credentials or allow attackers to manipulate site configuration, facilitating further compromise. Organizations relying on this plugin face risks of website defacement, data loss, and service outages. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and widespread exploitation. This can damage organizational reputation, cause financial losses, and impact customer trust. The vulnerability also poses risks to hosting providers and managed WordPress service providers who may host multiple affected sites, amplifying the potential impact.

Mitigation Recommendations

1. Immediate mitigation involves restricting access to the vulnerable plugin's functionality by limiting permissions and disabling or removing the HT Contact Form Widget plugin if not essential. 2. Monitor web server and WordPress logs for suspicious file deletion attempts or unexpected errors related to file operations. 3. Implement web application firewall (WAF) rules to detect and block attempts to exploit the temp_file_delete() function by filtering suspicious HTTP requests targeting the plugin's endpoints. 4. Maintain regular backups of WordPress sites and critical configuration files to enable rapid restoration in case of file deletion. 5. Apply the vendor's patch or update the plugin to a fixed version as soon as it becomes available; if no patch is currently released, coordinate with the vendor for timelines or consider alternative plugins. 6. Harden the WordPress environment by enforcing least privilege principles on file system permissions, ensuring the web server user cannot delete critical files unnecessarily. 7. Educate site administrators about the risks and signs of exploitation to enable early detection and response. 8. Consider isolating WordPress instances in containerized or sandboxed environments to limit blast radius in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-07T20:52:52.019Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6875d989a83201eaacccacf8

Added to database: 7/15/2025, 4:31:05 AM

Last enriched: 2/26/2026, 4:05:27 PM

Last updated: 3/25/2026, 7:03:00 AM

Views: 159

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses