Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8141: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in themeisle Redirection for Contact Form 7

0
High
VulnerabilityCVE-2025-8141cvecve-2025-8141cwe-22
Published: Wed Aug 20 2025 (08/20/2025, 01:44:36 UTC)
Source: CVE Database V5
Vendor/Project: themeisle
Product: Redirection for Contact Form 7

Description

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_associated_files function in all versions up to, and including, 3.2.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:51:18 UTC

Technical Analysis

CVE-2025-8141 is a path traversal vulnerability classified under CWE-22 found in the Redirection for Contact Form 7 plugin for WordPress, developed by themeisle. The vulnerability exists in the delete_associated_files function, which fails to properly validate and restrict file paths before deleting files. This flaw allows unauthenticated attackers to craft requests that specify arbitrary file paths outside the intended directory, resulting in deletion of any file accessible by the web server process. Since the plugin is widely used to manage redirections for Contact Form 7, a popular WordPress plugin, this vulnerability affects all versions up to and including 3.2.4. The CVSS v3.1 score is 8.8 (high), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is high because deleting critical files such as wp-config.php can lead to site downtime, data loss, and remote code execution if attackers manipulate the environment post-deletion. Although no exploits are currently known in the wild, the vulnerability is straightforward to exploit given the lack of authentication and weak path validation. The vulnerability was reserved on July 24, 2025, and published on August 20, 2025. No official patches or updates are listed yet, so mitigation requires immediate attention from site administrators.

Potential Impact

The vulnerability allows unauthenticated attackers to delete arbitrary files on the web server hosting the WordPress site. This can lead to severe consequences including denial of service by deleting critical configuration files, loss of data, and potentially remote code execution if attackers delete files that trigger fallback or recovery mechanisms. The integrity of the website and its data is compromised, and availability is disrupted. Organizations relying on this plugin face risks of website defacement, downtime, and potential lateral movement within their infrastructure if attackers gain further access. The broad usage of Contact Form 7 and its redirection plugin means a large number of WordPress sites globally are at risk. The ease of exploitation and high impact make this a critical threat to website security and business continuity.

Mitigation Recommendations

Until an official patch is released, organizations should immediately disable or uninstall the Redirection for Contact Form 7 plugin to prevent exploitation. Restrict web server file permissions to limit the plugin’s ability to delete sensitive files outside its directory. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting path traversal patterns targeting the delete_associated_files function. Monitor web server logs for unusual deletion requests or errors related to file access. Consider isolating WordPress instances in containers or sandboxes to limit damage scope. Once a patch is available, apply it promptly and verify the plugin version is updated beyond 3.2.4. Additionally, maintain regular backups of critical files like wp-config.php to enable rapid recovery. Educate site administrators about the risks of unauthenticated file deletion vulnerabilities and enforce least privilege principles for all plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-24T16:21:17.311Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a533d0ad5a09ad00ff4062

Added to database: 8/20/2025, 2:32:48 AM

Last enriched: 2/26/2026, 4:51:18 PM

Last updated: 3/26/2026, 11:12:34 AM

Views: 175

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses