Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-11473 | The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order. |
Tue, 08 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rocklobster
Rocklobster contact Form 7 |
|
| CPEs | cpe:2.3:a:rocklobster:contact_form_7:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Rocklobster
Rocklobster contact Form 7 |
Wed, 16 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Apr 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order. | |
| Title | Contact Form 7 <= 6.0.5 - Order Replay Vulnerability | |
| Weaknesses | CWE-354 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:46:27.696Z
Reserved: 2025-04-04T00:06:57.248Z
Link: CVE-2025-3247
Updated: 2025-04-16T13:23:36.712Z
Status : Analyzed
Published: 2025-04-16T06:15:42.933
Modified: 2025-07-08T18:13:23.407
Link: CVE-2025-3247
No data.
OpenCVE Enrichment
Updated: 2026-04-21T21:30:45Z
EUVD