CVE-2025-9944: CWE-352 Cross-Site Request Forgery (CSRF) in kelderic Professional Contact Form
The Professional Contact Form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the watch_for_contact_form_submit function. This makes it possible for unauthenticated attackers to trigger test email sending via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-9944 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the kelderic Professional Contact Form plugin for WordPress, present in all versions up to and including 1.0.0. The root cause is the absence or improper implementation of nonce validation in the watch_for_contact_form_submit function, which is responsible for handling test email submissions. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce checks, attackers can craft malicious web pages or links that, when visited or clicked by an authenticated site administrator, cause the site to execute unintended actions—in this case, sending test emails. Although the attacker does not need to be authenticated, the attack requires the administrator to perform an action such as clicking a link, making social engineering a key component of exploitation. The vulnerability does not expose confidential data nor disrupt service availability but can be used to send unauthorized emails, potentially facilitating phishing or spam campaigns. The CVSS 3.1 base score of 4.3 reflects the network attack vector, low attack complexity, no privileges required, but user interaction is necessary, and the impact is limited to integrity (unauthorized action execution) without confidentiality or availability loss. No patches or exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly to prevent abuse.
Potential Impact
The primary impact of CVE-2025-9944 is the unauthorized triggering of test email sends from the affected WordPress site, which can be leveraged by attackers to conduct phishing, spam, or social engineering campaigns. Although the vulnerability does not directly compromise sensitive data or site availability, it undermines the integrity of site operations by allowing attackers to perform actions without proper authorization. This can erode trust in the affected organization's communications and potentially lead to further compromise if attackers use the email functionality to distribute malicious content. Organizations relying on the Professional Contact Form plugin are at risk of reputational damage and indirect security incidents if attackers exploit this vulnerability. The requirement for administrator interaction limits the scope somewhat but does not eliminate risk, especially in environments where administrators may be targeted with phishing attempts. Given WordPress's global prevalence, the impact can be widespread, particularly for organizations with high administrative activity and reliance on this plugin for contact management.
Mitigation Recommendations
To mitigate CVE-2025-9944, organizations should immediately verify whether they use the kelderic Professional Contact Form plugin and update to a patched version once available. In the absence of an official patch, administrators or developers should implement nonce validation in the watch_for_contact_form_submit function to ensure that all requests are verified as legitimate and originate from authorized users. Additionally, administrators should be trained to recognize and avoid clicking suspicious links, especially those received via email or untrusted sources, to reduce the risk of social engineering exploitation. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin can provide an additional protective layer. Regular security audits and monitoring of email sending patterns can help detect anomalous activity indicative of exploitation. Finally, limiting administrative access and enforcing multi-factor authentication can reduce the likelihood of successful attacks leveraging this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-9944: CWE-352 Cross-Site Request Forgery (CSRF) in kelderic Professional Contact Form
Description
The Professional Contact Form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the watch_for_contact_form_submit function. This makes it possible for unauthenticated attackers to trigger test email sending via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9944 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the kelderic Professional Contact Form plugin for WordPress, present in all versions up to and including 1.0.0. The root cause is the absence or improper implementation of nonce validation in the watch_for_contact_form_submit function, which is responsible for handling test email submissions. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Without proper nonce checks, attackers can craft malicious web pages or links that, when visited or clicked by an authenticated site administrator, cause the site to execute unintended actions—in this case, sending test emails. Although the attacker does not need to be authenticated, the attack requires the administrator to perform an action such as clicking a link, making social engineering a key component of exploitation. The vulnerability does not expose confidential data nor disrupt service availability but can be used to send unauthorized emails, potentially facilitating phishing or spam campaigns. The CVSS 3.1 base score of 4.3 reflects the network attack vector, low attack complexity, no privileges required, but user interaction is necessary, and the impact is limited to integrity (unauthorized action execution) without confidentiality or availability loss. No patches or exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly to prevent abuse.
Potential Impact
The primary impact of CVE-2025-9944 is the unauthorized triggering of test email sends from the affected WordPress site, which can be leveraged by attackers to conduct phishing, spam, or social engineering campaigns. Although the vulnerability does not directly compromise sensitive data or site availability, it undermines the integrity of site operations by allowing attackers to perform actions without proper authorization. This can erode trust in the affected organization's communications and potentially lead to further compromise if attackers use the email functionality to distribute malicious content. Organizations relying on the Professional Contact Form plugin are at risk of reputational damage and indirect security incidents if attackers exploit this vulnerability. The requirement for administrator interaction limits the scope somewhat but does not eliminate risk, especially in environments where administrators may be targeted with phishing attempts. Given WordPress's global prevalence, the impact can be widespread, particularly for organizations with high administrative activity and reliance on this plugin for contact management.
Mitigation Recommendations
To mitigate CVE-2025-9944, organizations should immediately verify whether they use the kelderic Professional Contact Form plugin and update to a patched version once available. In the absence of an official patch, administrators or developers should implement nonce validation in the watch_for_contact_form_submit function to ensure that all requests are verified as legitimate and originate from authorized users. Additionally, administrators should be trained to recognize and avoid clicking suspicious links, especially those received via email or untrusted sources, to reduce the risk of social engineering exploitation. Employing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting this plugin can provide an additional protective layer. Regular security audits and monitoring of email sending patterns can help detect anomalous activity indicative of exploitation. Finally, limiting administrative access and enforcing multi-factor authentication can reduce the likelihood of successful attacks leveraging this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-03T13:05:44.835Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d87cd25d6228f86ddc92a2
Added to database: 9/28/2025, 12:09:54 AM
Last enriched: 2/26/2026, 6:23:34 PM
Last updated: 3/25/2026, 1:12:54 AM
Views: 145
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.