CVE-2026-32483
Missing Authorization in Contact Form Email Plugin Allows Unauthorized Access
Publication date: 2026-03-25
Last updated on: 2026-04-29
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| codepeople | contact_form_email | to 1.3.63 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Missing Authorization issue in the codepeople Contact Form Email plugin, specifically in the contact-form-to-email feature. It allows attackers to exploit incorrectly configured access control security levels, potentially bypassing restrictions that should prevent unauthorized actions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability CVE-2026-32483 is a broken access control issue that allows unauthorized privilege escalation in the WordPress Contact Form Email Plugin. Such unauthorized access could potentially lead to exposure or manipulation of personal or sensitive data handled by the plugin.
While the provided information does not explicitly mention compliance with standards like GDPR or HIPAA, broken access control vulnerabilities generally pose risks to data confidentiality and integrity, which are critical requirements under these regulations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability arises from missing authorization checks in the WordPress Contact Form Email Plugin versions up to 1.3.63, allowing unprivileged users to perform higher privilege actions.
Detection typically involves monitoring for exploitation attempts targeting the plugin's vulnerable functions, which may be identified by unusual access patterns or unauthorized actions performed by low-privilege users.
Patchstack provides mitigation rules that can block exploitation attempts, which may include signatures or rules usable in intrusion detection systems.
However, no specific commands or detection scripts are provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
The primary immediate step to mitigate this vulnerability is to update the WordPress Contact Form Email Plugin to version 1.3.64 or later, where the broken access control flaw has been patched.
Additionally, applying Patchstackβs mitigation rules can help block exploitation attempts until the plugin is updated.
Users are strongly advised to implement these updates and mitigations promptly to prevent unauthorized privilege escalation.
How can this vulnerability impact me? :
The impact of this vulnerability could include unauthorized users being able to perform actions or access data that should be restricted by access controls. This could lead to misuse of the contact form email functionality, potentially resulting in information disclosure or unauthorized communication.