CVE-2025-13384
WordPress · WordPress CP Contact Form with PayPal plugin
A high-severity vulnerability has been identified in the "CP Contact Form with PayPal" plugin for WordPress.
Executive summary
A high-severity vulnerability has been identified in the "CP Contact Form with PayPal" plugin for WordPress. This flaw allows unauthorized individuals to perform actions without proper permissions, potentially leading to the exposure of sensitive user data, unauthorized modification of settings, or disruption of payment-related services. Organizations using this plugin are at risk of data breaches and financial fraud and should take immediate action to mitigate this threat.
Vulnerability
The vulnerability is a Missing Authorization flaw. The plugin fails to properly verify that a user has the required permissions before executing certain functions. An unauthenticated or low-privileged attacker can craft a direct request to the vulnerable component of the plugin to bypass security checks and perform administrative actions, such as viewing submitted form data, altering plugin configurations, or deleting records.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a significant negative impact on the business. Potential consequences include the unauthorized disclosure of sensitive customer information submitted via the contact form, financial loss through manipulation of PayPal integration settings, and reputational damage resulting from a data breach. The disruption of the contact and payment form could also interrupt critical business operations and lead to a loss of customer trust.
Remediation
Immediate Action:
- Immediately update the "CP Contact Form with PayPal" plugin to the latest patched version provided by the vendor.
- If an update is not available, disable and uninstall the plugin until a secure version is released.
- Review WordPress security settings to ensure proper user roles and permissions are enforced. Remove any unnecessary or unused plugins to reduce the overall attack surface.
Proactive Monitoring:
- Monitor web server and WAF logs for direct or unusual POST/GET requests to the plugin's administrative functions or files, especially from unexpected IP addresses or user agents.
- Utilize a WordPress security plugin to audit for unauthorized changes to plugin settings or unexpected user permission escalations.
- Review form submission logs for any signs of tampering or unauthorized access.
Compensating Controls:
- If patching cannot be performed immediately, deploy a Web Application Firewall (WAF) with rules specifically designed to block requests attempting to exploit this vulnerability (virtual patching).
- Restrict access to the WordPress administrative dashboard (
/wp-admin) to only trusted IP addresses. - Enforce the principle of least privilege for all WordPress user accounts to limit the impact of a potential account compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high-severity CVSS score of 7.5 and the potential for sensitive data exposure and financial impact, we strongly recommend that organizations identify all instances of the "CP Contact Form with PayPal" plugin and apply the vendor-supplied patch immediately. Although this vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants urgent action. A proactive patching strategy is critical to prevent potential exploitation.