Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10321 | The Accept SagePay Payments Using Contact Form 7 plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file. |
Tue, 08 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Apr 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Accept SagePay Payments Using Contact Form 7 plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 through the publicly accessible phpinfo.php script. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed file. | |
| Title | Accept SagePay Payments Using Contact Form 7 <= 2.0 - Unauthenticated Information Exposure | |
| Weaknesses | CWE-200 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:31:36.570Z
Reserved: 2025-03-27T20:52:03.183Z
Link: CVE-2025-2883
Updated: 2025-04-08T13:04:07.459Z
Status : Deferred
Published: 2025-04-08T10:15:19.197
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-2883
No data.
OpenCVE Enrichment
Updated: 2026-04-20T23:30:16Z
EUVD