Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-11504 | The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 1.42.0 via the 'handle_stripe_single' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order. |
Wed, 28 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpmudev
Wpmudev forminator Forms |
|
| CPEs | cpe:2.3:a:wpmudev:forminator_forms:*:*:*:*:free:wordpress:*:* | |
| Vendors & Products |
Wpmudev
Wpmudev forminator Forms |
Thu, 17 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 17 Apr 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 1.42.0 via the 'handle_stripe_single' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order. | |
| Title | Forminator <= 1.42.0 - Order Replay Vulnerability | |
| Weaknesses | CWE-354 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:21:34.121Z
Reserved: 2025-04-09T19:48:06.225Z
Link: CVE-2025-3479
Updated: 2025-04-17T13:39:34.562Z
Status : Analyzed
Published: 2025-04-17T12:15:15.633
Modified: 2025-05-28T17:54:30.707
Link: CVE-2025-3479
No data.
OpenCVE Enrichment
Updated: 2026-04-20T23:15:06Z
EUVD