CVE-2026-32483
Received Received - Intake
Missing Authorization in Contact Form Email Plugin Allows Unauthorized Access

Publication date: 2026-03-25

Last updated on: 2026-04-29

Assigner: Patchstack

Description
Missing Authorization vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.63.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
codepeople contact_form_email to 1.3.63 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Missing Authorization issue in the codepeople Contact Form Email plugin, specifically in the contact-form-to-email feature. It allows attackers to exploit incorrectly configured access control security levels, potentially bypassing restrictions that should prevent unauthorized actions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-32483 is a broken access control issue that allows unauthorized privilege escalation in the WordPress Contact Form Email Plugin. Such unauthorized access could potentially lead to exposure or manipulation of personal or sensitive data handled by the plugin.

While the provided information does not explicitly mention compliance with standards like GDPR or HIPAA, broken access control vulnerabilities generally pose risks to data confidentiality and integrity, which are critical requirements under these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability arises from missing authorization checks in the WordPress Contact Form Email Plugin versions up to 1.3.63, allowing unprivileged users to perform higher privilege actions.

Detection typically involves monitoring for exploitation attempts targeting the plugin's vulnerable functions, which may be identified by unusual access patterns or unauthorized actions performed by low-privilege users.

Patchstack provides mitigation rules that can block exploitation attempts, which may include signatures or rules usable in intrusion detection systems.

However, no specific commands or detection scripts are provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

The primary immediate step to mitigate this vulnerability is to update the WordPress Contact Form Email Plugin to version 1.3.64 or later, where the broken access control flaw has been patched.

Additionally, applying Patchstack’s mitigation rules can help block exploitation attempts until the plugin is updated.

Users are strongly advised to implement these updates and mitigations promptly to prevent unauthorized privilege escalation.


How can this vulnerability impact me? :

The impact of this vulnerability could include unauthorized users being able to perform actions or access data that should be restricted by access controls. This could lead to misuse of the contact form email functionality, potentially resulting in information disclosure or unauthorized communication.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart