CVE-2025-68046
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-01-28

Assigner: Patchstack

Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ThemeHunk Contact Form & Lead Form Elementor Builder lead-form-builder allows Retrieve Embedded Sensitive Data.This issue affects Contact Form & Lead Form Elementor Builder: from n/a through <= 2.0.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-01-28
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
themehunk contact_form_lead_form_elementor_builder to 2.0.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-497 The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-68046 is a medium priority Sensitive Data Exposure vulnerability in the WordPress Contact Form & Lead Form Elementor Builder Plugin (up to version 2.0.1). It allows a malicious user with subscriber or developer privileges to access sensitive system information that should normally be restricted. This vulnerability is classified under OWASP Top 10 A1: Broken Access Control and can be used to exploit other system weaknesses. [1]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to sensitive information within your system, potentially allowing attackers to leverage this data to exploit other vulnerabilities or weaknesses. This could compromise the security and integrity of your website or system, leading to data breaches or further attacks. [1]


What immediate steps should I take to mitigate this vulnerability?

Apply the mitigation rule issued by Patchstack to block attacks targeting this vulnerability until an official patch is released. Users are advised to implement this mitigation promptly to protect their websites running the affected plugin versions. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability exposes sensitive system information to unauthorized users, which could lead to unauthorized access to personal or sensitive data. This exposure may result in non-compliance with data protection regulations such as GDPR and HIPAA, which require safeguarding sensitive information against unauthorized access. Organizations using the affected plugin should consider this risk in their compliance assessments and apply mitigations promptly to reduce potential regulatory impact. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart