CVE-2025-24772
BaseFortify
Publication date: 2025-06-06
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) in the WordPress plugin "Pay with Contact Form 7" versions up to 1.0.4. It allows an attacker to trick authenticated users with higher privileges into performing unwanted actions on the site without their consent. Essentially, the attacker can exploit the trust a site has in a user's browser to execute actions that compromise site security. [1]
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized actions being executed on your site by attackers exploiting authenticated users. This can lead to compromised site security, potential data manipulation, or disruption of site functionality. Since the plugin is abandoned and unpatched, the risk remains unless you replace the plugin or apply virtual patching. Automated attacks may opportunistically target this vulnerability, so professional incident response and server-side malware scanning are recommended if compromised. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves monitoring for exploitation attempts targeting the Pay with Contact Form 7 plugin, which is vulnerable to CSRF attacks. Since no official patch or plugin-based scanner is reliable due to possible tampering, it is recommended to perform server-side malware scanning and professional incident response if compromise is suspected. Specific commands are not provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the vulnerable Pay with Contact Form 7 plugin with an alternative solution, as the plugin is abandoned and unpatched. Deactivating the plugin alone is insufficient unless combined with a virtual patch (vPatch) that can auto-block exploitation attempts. Applying such virtual patching is recommended to provide immediate protection. [1]