Home

Description

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to download sensitive form submission data containing personally identifiable information (PII) by accessing the CSV export endpoint with an export key that is exposed in publicly accessible page source code. The vulnerability is created because while the shortcode properly filters displayed entries by user, the CSV export handler completely bypasses this filtering and exports all entries regardless of user permissions.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-28 | Updated 2026-01-28 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-09:Vendor Notified
2026-01-27:Disclosed

Credits

Teerachai Somprasong finder

References

www.wordfence.com/...-fece-42aa-baf3-c636c4875635?source=cve

plugins.trac.wordpress.org/...trunk/contact-form-entries.php

plugins.trac.wordpress.org/...1.4.5/contact-form-entries.php

plugins.trac.wordpress.org/...trunk/contact-form-entries.php

plugins.trac.wordpress.org/...runk/templates/leads-table.php

plugins.trac.wordpress.org/...-entries&sfp_email=&sfph_mail=

cve.org (CVE-2026-0825)

nvd.nist.gov (CVE-2026-0825)

Download JSON