CVE-2025-9944: CWE-352 Cross-Site Request Forgery (CSRF) in kelderic Professional Contact Form
The Professional Contact Form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the watch_for_contact_form_submit function. This makes it possible for unauthenticated attackers to trigger test email sending via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-9944 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Professional Contact Form plugin for WordPress, developed by kelderic. This vulnerability exists in all versions up to and including 1.0.0 due to missing or incorrect nonce validation in the function watch_for_contact_form_submit. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third-party sites. The absence or improper implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, if an authenticated site administrator is tricked into clicking a link or visiting a malicious webpage, can trigger the plugin to send test emails without the administrator's consent. This attack vector exploits the trust relationship between the administrator's browser session and the WordPress site. Although the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by allowing unauthorized actions to be performed on behalf of the administrator. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack requires user interaction (UI:R) but no privileges (PR:N) and can be executed remotely (AV:N) with low attack complexity (AC:L). There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given the widespread use of WordPress and its plugins, this vulnerability could affect many websites using this specific plugin if not mitigated promptly.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the Professional Contact Form plugin installed. The impact is mainly on the integrity of the affected site’s operations, as attackers can cause unauthorized test emails to be sent, potentially leading to email spam, phishing attempts, or reputation damage if attackers use this vector to send misleading or malicious content. While the vulnerability does not directly expose sensitive data or cause denial of service, the ability to perform actions as an administrator without authentication can be leveraged in multi-stage attacks or social engineering campaigns. Organizations relying on WordPress for customer contact or lead generation should be cautious, as exploitation could undermine trust in their communication channels. Additionally, regulatory frameworks in Europe such as GDPR emphasize the protection of personal data and integrity of communications, so any misuse of contact forms could have compliance implications if personal data is involved or if the attack leads to data misuse.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate review and update of the Professional Contact Form plugin to a patched version once available from the vendor. Since no patches are currently released, organizations should consider temporarily disabling the plugin or replacing it with alternative contact form plugins that implement proper nonce validation. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the contact form submission endpoints, especially those lacking valid nonce tokens or originating from untrusted referrers. 3) Educate site administrators about the risks of clicking on unsolicited links or visiting untrusted websites while logged into the WordPress admin panel to reduce the risk of social engineering exploitation. 4) Employ Content Security Policy (CSP) headers and SameSite cookie attributes to limit cross-origin requests and reduce CSRF attack surface. 5) Regularly audit WordPress plugins for security best practices, focusing on nonce usage and input validation. 6) Monitor logs for unusual email sending activity or unexpected form submissions that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9944: CWE-352 Cross-Site Request Forgery (CSRF) in kelderic Professional Contact Form
Description
The Professional Contact Form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the watch_for_contact_form_submit function. This makes it possible for unauthenticated attackers to trigger test email sending via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-9944 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Professional Contact Form plugin for WordPress, developed by kelderic. This vulnerability exists in all versions up to and including 1.0.0 due to missing or incorrect nonce validation in the function watch_for_contact_form_submit. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third-party sites. The absence or improper implementation of nonce validation allows an unauthenticated attacker to craft a malicious request that, if an authenticated site administrator is tricked into clicking a link or visiting a malicious webpage, can trigger the plugin to send test emails without the administrator's consent. This attack vector exploits the trust relationship between the administrator's browser session and the WordPress site. Although the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by allowing unauthorized actions to be performed on behalf of the administrator. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack requires user interaction (UI:R) but no privileges (PR:N) and can be executed remotely (AV:N) with low attack complexity (AC:L). There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability is classified under CWE-352, which is a common web security weakness related to CSRF attacks. Given the widespread use of WordPress and its plugins, this vulnerability could affect many websites using this specific plugin if not mitigated promptly.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites running WordPress with the Professional Contact Form plugin installed. The impact is mainly on the integrity of the affected site’s operations, as attackers can cause unauthorized test emails to be sent, potentially leading to email spam, phishing attempts, or reputation damage if attackers use this vector to send misleading or malicious content. While the vulnerability does not directly expose sensitive data or cause denial of service, the ability to perform actions as an administrator without authentication can be leveraged in multi-stage attacks or social engineering campaigns. Organizations relying on WordPress for customer contact or lead generation should be cautious, as exploitation could undermine trust in their communication channels. Additionally, regulatory frameworks in Europe such as GDPR emphasize the protection of personal data and integrity of communications, so any misuse of contact forms could have compliance implications if personal data is involved or if the attack leads to data misuse.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate review and update of the Professional Contact Form plugin to a patched version once available from the vendor. Since no patches are currently released, organizations should consider temporarily disabling the plugin or replacing it with alternative contact form plugins that implement proper nonce validation. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the contact form submission endpoints, especially those lacking valid nonce tokens or originating from untrusted referrers. 3) Educate site administrators about the risks of clicking on unsolicited links or visiting untrusted websites while logged into the WordPress admin panel to reduce the risk of social engineering exploitation. 4) Employ Content Security Policy (CSP) headers and SameSite cookie attributes to limit cross-origin requests and reduce CSRF attack surface. 5) Regularly audit WordPress plugins for security best practices, focusing on nonce usage and input validation. 6) Monitor logs for unusual email sending activity or unexpected form submissions that could indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-03T13:05:44.835Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d87cd25d6228f86ddc92a2
Added to database: 9/28/2025, 12:09:54 AM
Last enriched: 10/5/2025, 12:52:55 AM
Last updated: 11/9/2025, 7:58:14 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12917: Denial of Service in TOZED ZLT T10
MediumCVE-2025-12916: Command Injection in Sangfor Operation and Maintenance Security Management System
MediumCVE-2025-12915: File Inclusion in 70mai X200
HighCVE-2025-12914: SQL Injection in aaPanel BaoTa
MediumCVE-2025-12913: SQL Injection in code-projects Responsive Hotel Site
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.