Home

Description

The Contact Form 7 plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 6.0.5 via the 'wpcf7_stripe_skip_spam_check' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order.

PUBLISHED Reserved 2025-04-04 | Published 2025-04-16 | Updated 2025-04-16 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-354 Improper Validation of Integrity Check Value

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-04-15:Disclosed

Credits

Asaf Mozes finder

References

www.wordfence.com/...-288e-4028-af65-85f5389888ac?source=cve

plugins.trac.wordpress.org/....0.5/modules/stripe/stripe.php

plugins.trac.wordpress.org/changeset/3270138/

cve.org (CVE-2025-3247)

nvd.nist.gov (CVE-2025-3247)

Download JSON