Home

Description

The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).

PUBLISHED Reserved 2025-11-18 | Published 2025-11-22 | Updated 2025-11-24 | Assigner Wordfence




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-19:Vendor Notified
2025-11-21:Disclosed

Credits

Md. Moniruzzaman Prodhan finder

References

www.wordfence.com/...-8f26-4ee5-8c4b-2efcf34668a2?source=cve

plugins.trac.wordpress.org/...cp_contactformpp_functions.php

plugins.trac.wordpress.org/...cp_contactformpp_functions.php

plugins.trac.wordpress.org/...cp_contactformpp_functions.php

plugins.trac.wordpress.org/...h-paypal&sfp_email=&sfph_mail=

cve.org (CVE-2025-13384)

nvd.nist.gov (CVE-2025-13384)

Download JSON