Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 22 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Themeisle
Themeisle redirection For Contact Form 7 Wordpress Wordpress wordpress |
|
| Vendors & Products |
Themeisle
Themeisle redirection For Contact Form 7 Wordpress Wordpress wordpress |
Sun, 21 Dec 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server. | |
| Title | Redirection for Contact Form 7 <= 3.2.7 - Unauthenticated Arbitrary File Copy via move_file_to_upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:16:25.117Z
Reserved: 2025-12-16T20:20:41.998Z
Link: CVE-2025-14800
Updated: 2025-12-22T16:36:58.868Z
Status : Deferred
Published: 2025-12-21T08:15:48.473
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14800
No data.
OpenCVE Enrichment
Updated: 2026-04-20T21:30:18Z